Which of the following are the examples of technical controls?
Which of the following are the examples of technical controls? Each correct answer represents a
complete solution. Choose three.
Which of the following processes is described in the statement below?
Which of the following processes is described in the statement below?
“It is the process of implementing risk response plans, tracking identified risks, monitoring residual
risk, identifying new risks, and evaluating risk process effectiveness throughout the project.”
which security practices are measured?
Which of the following tenets does the CIA triad provide for which security practices are measured?
Each correct answer represents a part of the solution. Choose all that apply.
What should Walter also update in this scenario considering the risk event?
Walter is the project manager of a large construction project. He’ll be working with several vendors
on the project. Vendors will be providing materials and labor for several parts of the project. Some
of the works in the project are very dangerous so Walter has implemented safety requirements for
all of the vendors and his own project team. Stakeholders for the project have added new
requirements, which have caused new risks in the project. A vendor has identified a new risk that
could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the
risk register and created potential risk responses to mitigate the risk. What should Walter also
update in this scenario considering the risk event?
Which of the following types of attacks cannot be prevented by technical measures only?
Which of the following types of attacks cannot be prevented by technical measures only?
What should Walter also update in this scenario considering the risk event?
Walter is the project manager of a large construction project. He’ll be working with several vendors
on the project. Vendors will be providing materials and labor for several parts of the project. Some
of the works in the project are very dangerous so Walter has implemented safety requirements for
all of the vendors and his own project team. Stakeholders for the project have added new
requirements, which have caused new risks in the project. A vendor has identified a new risk that
could affect the project if it comes into fruition. Walter agrees with the vendor and has updated the
risk register and created potential risk responses to mitigate the risk. What should Walter also
update in this scenario considering the risk event?
Where should you document the proposed responses and the current status of all identified risks?
You are the project manager of the HJK Project for your organization. You and the project team have
created risk responses for many of the risk events in the project. Where should you document the
proposed responses and the current status of all identified risks?
Which of the following attacks can be overcome by applying cryptography?
Which of the following attacks can be overcome by applying cryptography?
Which of the following security controls will you use for the deployment phase of the SDLC to build secure sof
Which of the following security controls will you use for the deployment phase of the SDLC to build
secure software?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following authentication methods prevents unauthorized execution of code on remote systems?
Which of the following authentication methods prevents unauthorized execution of code on remote
systems?