A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?
Which of the following SSE-CMM security engineering Process Areas (PA) provides the security input?
You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?
Which of the following backup sites is the best way for rapid recovery if you do not need the full recovery temporarily?
Which of the following backup sites is a replica of the original site of an organization with full computer systems as well as near-complete backups of user data?
Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?
Each correct answer represents a part of the solution. Choose all that apply.
Which of the following actions can be performed by using the principle of separation of duties?
Which of the following cryptographic system services assures the receiver that the received message has not been altered?
Which of the following options is an activity of observing the content that appears on a computer monitor or watching what a user is typing?
Fill in the blank with the appropriate number:
RAID-______is a combination of RAID-1 and RAID-0.
Which of the following cryptographic system services proves a user's identity?
You work as a project manager for BlueWell Inc. You are working with your team members on the risk responses in the project. Which risk response will likely cause a project to use the procurement processes?
Which of the following options is an activity of observing the content that appears on a computer monitor or watching what a user is typing?
You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?
Which of the following control measures are considered while creating a disaster recovery plan?
Each correct answer represents a part of the solution. Choose three.
You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?
Which of the following individuals incorporates risk assessment in training programs for the
organization's personnel?
Fill in the blank with the appropriate phrase.
__________________ is the process of obtaining access using legitimate credentials, and then attempting to leverage that into access to unauthorized system resources.
Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service attacks, or unauthorized changes to system hardware, software, or data?
Which of the following security procedures is NOT related to the SDLC's disposition?
Which of the following types of storage requires some direct human action in order to make
access to the storage media physically possible?
Which of the following security procedures is related to the SDLC's implementation?
Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?
Which of the following sites is a non-mainstream alternative to a traditional recovery site?
Which of the following phases involves getting the final senior management signoff and creating enterprise-wide awareness of the plan?
Which of the following processes identifies the threats that can impact the business continuity of operations?
Fill in the blank:
A______plan is a plan devised for a specific situation when things could go wrong.
Which of the following statements are true about an APW (Air Pressurized Water) extinguisher?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?
Which of the following BCP teams assesses the damage of the disaster in order to provide the estimate of the time required to recover?
John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.
In which of the following prototyping, a version of the system is built to check the requirements and is then discarded?
Who among the following has the ultimate responsibility for the protection of the organization's information?
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?
Which of the following defines the communication link between a Web server and Web applications?
Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will he use to fulfill this requirement?
Fill the measurement of SFX form factor style power supply in the blank space.
The SFX form factor style power supply is ___________mm wide, mm deep, and mm in height.
Which of the following measurements of a disaster recovery plan are aimed at detecting unwanted events?