Which of the following security procedures is related to the SDLC's implementation?
Which of the following statements about disaster recovery plan documentation are true? Each correct answer represents a complete solution. Choose all that apply.
ISO 17799 has two parts. The first part is an implementation guide with guidelines on how to build a comprehensive information security infrastructure and the second part is an auditing guide based on requirements that must be met for an organization to be deemed compliant with ISO 17799. What are the ISO 17799 domains?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?
Which of the following TCB techniques involves viewing system components at a high level and ignoring or segregating its specific details?
Which of the following governance bodies provides management, operational, and technical controls to satisfy the security requirements?
Which of the following processes helps the business units to understand the impact of a disruptive event?
Which of the following is prepared by the business and serves as a starting point for producing the IT Service Continuity Strategy?
Which of the following classification schemes is considered to be of a personal nature and is
intended for company use only?
Which of the following provides a means of predicting the outcome of the next software project conducted by an organization?
Which of the following BCP teams deals with the key decision making and guides recovery teams and business personnel?
Which of the following processes involves reducing the risk until it reaches a level acceptable to an organization?
Which of the following plans provides procedures for disseminating status reports to personnel and the public?
Which of the following processes involves taking measures to alter or improve the risk position of an asset throughout the company?
Which of the following sub-processes of IT Service Continuity Management is used to make sure that all members of IT staff with responsibilities for fighting disasters are aware of their exactduties?
Which of the following are some of the parts of a project plan?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?
Which of the following roles is responsible for the review and risk analysis of all the contracts on regular basis?
Which of the following cryptographic system services assures the receiver that the received message has not been altered?
Which of the following command line tools are available in Helix Live acquisition tool on Windows?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service attacks, or unauthorized changes to system hardware, software, or data?
Which of the following statements are true about classless routing protocols?
Each correct answer represents a complete solution. Choose two.
Which of the following tests ensures that the organization complies with the requirements of the disaster recovery plan?
Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?
Which of the following backup sites is the best way for rapid recovery if you do not need the full recovery temporarily?
You are the project manager for a construction project. The project involves casting of a column in a very narrow space. Because of the lack of space, casting is highly dangerous. High technical skill will be required for casting that column. You decide to hire a local expert team for casting that column. Which of the following types of risk response are you following?
Which of the following best describes the identification, analysis, and ranking of risks?
Which of the following refers to the ability to ensure that the data is not modified or tampered with?
Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?
Which of the following phases is the first step towards creating a business continuity plan?
Which of the following documents is necessary to continue the business in the event of disaster or emergency?
Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?
Which of the following options is an intellectual property right to protect inventions?
Which of the following BCP teams handles financial arrangement, public relations, and media inquiries in the time of disaster recovery?
Which of the following sources is the best for developing Recovery Time Objectives (RTO)?
Which of the following TCB techniques involves viewing system components at a high level and ignoring or segregating its specific details?
Which of the following options is an activity of observing the content that appears on a computer monitor or watching what a user is typing?
Which of the following statements are true about classless routing protocols?
Each correct answer represents a complete solution. Choose two.
Availability Management deals with the day-to-day availability of services. Which of the following takes over when a 'disaster' situation occurs?
Which of the following modes of operation supports users with different clearances and data at various classification levels?
You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?
Which of the following should the administrator ensure during the test of a disaster recovery plan?
Which of the following processes is NOT included in the risk mitigation?