which of the following SDLC phases is the system’s security features configured and enabled…?
In which of the following SDLC phases is the system’s security features configured and enabled,
the system is tested and installed or fielded, and the system is authorized for processing?
The ____________ is the risk that remains after the implementation of new or enhanced controls
Fill in the blank with the appropriate phrase. The ____________ is the risk that remains after the
implementation of new or enhanced controls.
Which of the following phases of the Incident handling process should you follow next to handle this incident?
You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process
to handle the events and incidents. You identify Denial of Service attack (DOS) from a network
linked to your internal enterprise network. Which of the following phases of the Incident handling
process should you follow next to handle this incident?
Which of the following statements is related with the first law of OPSEC?
Which of the following statements is related with the first law of OPSEC?
Which of the following response teams aims to foster cooperation and coordination in incident prevention…
Which of the following response teams aims to foster cooperation and coordination in incident
prevention, to prompt rapid reaction to incidents, and to promote information sharing among
members and the community at large?
Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of co
Which of the following is designed to detect unwanted attempts at accessing, manipulating, and
disabling of computer systems through the Internet
Which of the following locations must have a camera in order to provide the minimum level of security for the
You have decided to implement video surveillance in your company in order to enhance network
security. Which of the following locations must have a camera in order to provide the minimum
level of security for the network resources? Each correct answer represents a complete solution.
Choose two.
Who decides the category of a change?
Change Management is used to ensure that standardized methods and procedures are used for
efficient handling of all changes. Who decides the category of a change?
Which of the following security controls is standardized by the Internet Engineering Task Force (IETF) as the
Which of the following security controls is standardized by the Internet Engineering Task Force
(IETF) as the primary network layer protection mechanism
What will you implement to accomplish this?
You work as a Network Administrator for NetTech Inc. You want to have secure communication on
the company’s intranet. You decide to use public key and private key pairs. What will you
implement to accomplish this?