Which of the following components of configuration management involves periodic checks to determine the consis
Which of the following components of configuration management involves periodic checks to
determine the consistency and completeness of accounting information and to verify that all
configuration management policies are being followed?
which of the following deployment models of cloud is the cloud infrastructure administered by the organization
In which of the following deployment models of cloud is the cloud infrastructure administered by
the organizations or a third party? Each correct answer represents a complete solution. Choose
two.
Which of the following disaster recovery tests includes the operations that shut down at the primary site̷
Which of the following disaster recovery tests includes the operations that shut down at the
primary site, and are shifted to the recovery site according to the disaster recovery plan?
Which of the following statements about a host-based intrusion prevention system (HIPS) are true?
Which of the following statements about a host-based intrusion prevention system (HIPS) are
true? Each correct answer represents a complete solution. Choose two.
Who amongst the following makes the final accreditation decision?
Who amongst the following makes the final accreditation decision?
Where can you find this information?
You are the project manager of the GHY project for your organization. You are about to start the
qualitative risk analysis process for the project and you need to determine the roles and
responsibilities for conducting risk management. Where can you find this information?
How many risk response types are available for a negative risk event in the project?
You work as a project manager for BlueWell Inc. You are preparing to plan risk responses for your
project with your team. How many risk response types are available for a negative risk event in the
project?
Which of the following security models will you use?
You work as an analyst for Tech Perfect Inc. You want to prevent information flow that may cause
a conflict of interest in your organization representing competing clients. Which of the following
security models will you use?
Which of the following are the phases of the Certification and Accreditation (C&A) process?
Which of the following are the phases of the Certification and Accreditation (C&A) process? Each
correct answer represents a complete solution. Choose two.
Which of the following elements of the BCP process emphasizes on creating the scope and the additional element
Which of the following elements of the BCP process emphasizes on creating the scope and the
additional elements required to define the parameters of the plan?