What will be the annualized loss expectancy in your project?
You work as a project manager for SoftTech Inc. A threat with a dollar value of $150,000 is expected
to happen in your project and the frequency of threat occurrence per year is 0.001. What will be the
annualized loss expectancy in your project?
Which of the following are the responsibilities of the owner with regard to data in an information classificat
Which of the following are the responsibilities of the owner with regard to data in an information
classification program?
Each correct answer represents a complete solution. Choose three.
What is the best way to avoid this problem?
You work as the Network Administrator for a defense contractor. Your company works with sensitive
materials and all IT personnel have at least a secret level clearance. You are still concerned that one
individual could perhaps compromise the network (intentionally or unintentionally) by setting up
improper or unauthorized remote access. What is the best way to avoid this problem?
Which of the following statements is true about auditing?
Which of the following statements is true about auditing?
_______is a branch of forensic science pertaining to legal evidence found in computers and digital storage med
Fill in the blank with an appropriate phrase. _______is a branch of forensic science pertaining to
legal evidence found in computers and digital storage media.
Which one of the following is a valid response to the identified risk event?
Your project team has identified a project risk that must be responded to. The risk has been
recorded in the risk register and the project team has been discussing potential risk responses for
the risk event. The event is not likely to happen for several months but the probability of the
event is high. Which one of the following is a valid response to the identified risk event?
What the audience really wants to learn How receptive the audience is to the security program…?
Mark works as a security manager for SoftTech Inc. He is performing a security awareness program.
To be successful in performing the awareness program, he should take into account the needs and
current levels of training and understanding of the employees and audience.
There are five key ways, which Mark should keep in mind while performing this activity.
Current level of computer usage
What the audience really wants to learn
How receptive the audience is to the security program
How to gain acceptance
Who might be a possible ally
Which of the following activities is performed in this security awareness process?
What can Rachael do in this instance?
Rachael is the project manager for a large project in her organization. A new change request has
been proposed that will affect several areas of the project. One area of the project change impact is
on work that a vendor has already completed. The vendor is refusing to make the changes as they’ve
already completed the project work they were contracted to do. What can Rachael do in this
instance?
How many change control systems are there in project management?
How many change control systems are there in project management?
which of the following phases of the SDLC does the software and other components…?
In which of the following phases of the SDLC does the software and other components of the system
faithfully incorporate the design specifications and provide proper documentation and training?