What are the subordinate tasks of the Initiate and Plan IA C&A phase of the DIACAP process…
What are the subordinate tasks of the Initiate and Plan IA C&A phase of the DIACAP process
Each correct answer represents a complete solution. Choose all that apply.
Which of the following configuration management system processes defines which items will be configuration man
Which of the following configuration management system processes defines which items will be
configuration managed, how they are to be identified, and how they are to be documented
Which of the following encryption methods does IPsec VPN use?
IPsec VPN provides a high degree of data privacy by establishing trust points between
communicating devices and data encryption. Which of the following encryption methods does
IPsec VPN use? Each correct answer represents a complete solution. Choose two.
Which of the following can be prevented by an organization using job rotation and separation of duties policie
Which of the following can be prevented by an organization using job rotation and separation of
duties policies?
It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planni
Which of the following documents is described in the statement below It is developed along with all
processes of the risk management. It contains the results of the qualitative risk analysis,
quantitative risk analysis, and risk response planning.
Which type of attack is this?
A user is sending a large number of protocol packets to a network in order to saturate its
resources and to disrupt connections to prevent communications between services. Which type of
attack is this?
Which of the following data should be recorded in this documentation?
Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization
to conduct a seminar to give necessary information related to sexual harassment within the work
place. Peter started with the definition and types of sexual harassment. He then wants to convey
that it is important that records of the sexual harassment incidents should be maintained, which
helps in further legal prosecution. Which of the following data should be recorded in this
documentation? Each correct answer represents a complete solution. Choose all that apply.
What individual should respond to the risk with the preplanned risk response
Diane is the project manager of the HGF Project. A risk that has been identified and analyzed in
the project planning processes is now coming into fruition. What individual should respond to the
risk with the preplanned risk response
Which of the following types of firewall functions at the Session layer of OSI model?
Which of the following types of firewall functions at the Session layer of OSI model?
Which of the following types of evidence is considered as the best evidence?
Which of the following types of evidence is considered as the best evidence?