Grouping disks or servers together to provide mutual support is called _________.
Grouping disks or servers together to provide mutual support is called _________.
what threat?
A media librarian keeps an updated log of authorized software versions installed on the company network. This control is used to protect against what threat?
Which of the following has an incorrect definition mapping?
Which of the following has an incorrect definition mapping?
Which of the following is not a detective control?
Detective controls are used to identify and react. Which of the following is not a detective control?
What type of control is the company implementing?
Employees are told that the use of e-mail can only be used for business purposes and their activities will be monitored. Violations will result in a verbal warning, then a written warning, and finally termination. What type of control is the company implementing?
what standard security principle?
Some organizations over-issue privileged access to ensure that users can have access to devices in emergency situations or unconventional scenarios. This practice violates what standard security principle?
What is this security violation known as?
Tara leaves her operations workstation when she is summoned by the front desk supervisor. In her rushed exit, Tara leaves her computer unlocked. Amy leans over and begins browsing through her personal folders and files. What is this security violation known as?
Which of the following has an incorrect change control definition mapping?
Which of the following has an incorrect change control definition mapping?
i.Request for a change to take place Requests should be presented to an individual or group that is responsible for approving changes and overseeing the activities of changes that take place within an environment.
ii. Approval of the change The individual requesting the change should not justify the reasons and clearly show the benefits and possible pitfalls of the change.
iii. Documentation of the change Once the change is approved, it should be entered into a change log. The log should be updated as the process continues toward completion.
iv. Tested and presented The change must be fully tested to uncover any unforeseen results.
v. Implementation Once the change is fully tested and approved, a schedule should be developed that outlines the projected phases of the change being implemented and the necessary milestones.
vi. Report change to management A full report summarizing the change should be submitted to management.
Removing sensitive data on media devices, including all pointers within the system, is one way to prevent ____
Removing sensitive data on media devices, including all pointers within the system, is one way to prevent _______.
Which would require the lowest level of protection?
Which would require the lowest level of protection?