Which of the following DoD policies establishes policies and assigns responsibilities to achieve DoD IA…
Which of the following DoD policies establishes policies and assigns responsibilities to achieve
DoD IA through a defense-in-depth approach that integrates the capabilities of personnel,
operations, and technology, and supports the evolution to network-centric warfare?
Which of the following formulas best describes the Single Loss Expectancy (SLE)?
Single Loss Expectancy (SLE) represents an organization’s loss from a single threat. Which of the
following formulas best describes the Single Loss Expectancy (SLE)?
Which of the following is a patch management utility that scans one or more computers on a network and alerts
Which of the following is a patch management utility that scans one or more computers on a
network and alerts a user if any important Microsoft security patches are missing and also
provides links that enable those missing patches to be downloaded and installed?
applies the internal security policies of the software applications when they are deployed
Fill in the blank with an appropriate security type. applies the internal security policies of the
software applications when they are deployed.
Which of the following plans is documented and organized for emergency response, backup operations, and recove
Which of the following plans is documented and organized for emergency response, backup
operations, and recovery maintained by an activity as part of its security program that will ensure
the availability of critical resources and facilitates the continuity of operations in an emergency
situation?
which document will you most probably find this information?
An assistant from the HR Department calls you to ask the Service Hours & Maintenance Slots for
your ERP system. In which document will you most probably find this information?
Which of the following are the basic characteristics of declarative security?
Which of the following are the basic characteristics of declarative security? Each correct answer
represents a complete solution. Choose all that apply.
What are these tools and practices?
“Enhancing the Development Life Cycle to Produce Secure Software” summarizes the tools and
practices that are helpful in producing secure software. What are these tools and practices? Each
correct answer represents a complete solution. Choose three.
What levels of potential impact are defined by FIPS 199?
In 2003, NIST developed a new Certification & Accreditation (C&A) guideline known as FIPS 199.
What levels of potential impact are defined by FIPS 199? Each correct answer represents a
complete solution. Choose all that apply.
Which of the following NIST documents provides a guideline for identifying an information system as a National
Which of the following NIST documents provides a guideline for identifying an information system
as a National Security System?