which of the following disaster recovery testing plans is the most cost-effective and efficient way to identif
John works as a security manager for SoftTech Inc. He is working with his team on the disaster
recovery management plan. One of his team members has a doubt related to the most cost
effective DRP testing plan. According to you, which of the following disaster recovery testing plans
is the most cost-effective and efficient way to identify areas of overlap in the plan before
conducting more demanding training exercises?
Which of the following steps will you perform to accomplish the task?
You have created a team of HR Managers and Project Managers for Blue Well Inc. The team will
concentrate on hiring some new employees for the company and improving the organization’s
overall security by turning employees among numerous job positions. Which of the following steps
will you perform to accomplish the task?
Which of the following memorandums directs the Departments and Agencies to post clear privacy policies on Worl
Which of the following memorandums directs the Departments and Agencies to post clear privacy
policies on World Wide Web sites, and provides guidance for doing it
What information does the AV (Asset Value) convey?
You are calculating the Annualized Loss Expectancy (ALE) using the following formula: ALE=AV *
EF * ARO What information does the AV (Asset Value) convey?
What is the likely outcome of creating this type of chart?
Your project has several risks that may cause serious financial impact should they happen. You
have studied the risk events and made some potential risk responses for the risk events but
management wants you to do more. They’d like for you to create some type of a chart that
identified the risk probability and impact with a financial amount for each risk event. What is the
likely outcome of creating this type of chart?
Which of the following categories of system specification describes the technical, performance, operational, m
Which of the following categories of system specification describes the technical, performance,
operational, maintenance, and support characteristics for the entire system
What is the most likely cause?
You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the
browser’s address bar, you are able to access the site. But, you are unable to access the site
when you enter http://www.company.com. What is the most likely cause?
Which of the following persons is responsible for testing and verifying whether the security policy is properl
Which of the following persons is responsible for testing and verifying whether the security policy
is properly implemented, and the derived security solutions are adequate or not?
Which of the following is your best choice
You have been tasked with finding an encryption methodology that will encrypt most types of email
attachments. The requirements are that your solution must use the RSA algorithm. Which of the
following is your best choice
which of the following analysis is used to document the services and functions that have been accidentally lef
In software development, which of the following analysis is used to document the services and
functions that have been accidentally left out, deliberately eliminated or still need to be developed?