New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following are the steps of the Do stage of the project?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Operations and resources are managed.

B.

Training and awareness programs for affected staff are scheduled.

C.

The risk treatment plan is implemented and controls are planned.

D.

The options are identified and evaluated for the treatment of the risks.

You work as the project manager for Bluewell Inc. There has been a delay in your project work that is adversely affecting the project schedule. You decide, with your stakeholders' approval, to fast track the project work to get the project done faster. When you fast track the project, what is

likely to increase?

A.

Human resource needs

B.

Risks

C.

Costs

D.

Quality control concerns

You are the Network Administrator for a school. You are concerned that end users' might accidentally have access to resources they do not require. What concept should you implement in your network security management to best address this concern?

A.

ACL

B.

Explicit Deny

C.

The principle of least privileges

D.

Implicit Allow

How can you calculate the Annualized Loss Expectancy (ALE) that may occur due to a threat?

A.

Asset Value X Exposure Factor (EF)

B.

Single Loss Expectancy (SLE)/ Exposure Factor (EF)

C.

Exposure Factor (EF)/Single Loss Expectancy (SLE)

D.

Single Loss Expectancy (SLE) X Annualized Rate of Occurrence (ARO)

Which of the following groupings is correct regarding security measures?

A.

Physical, logical, preventive, detective

B.

Preventive, detective, repressive, corrective

C.

Logical, repressive, preventive, corrective

D.

Organizational, preventive, corrective, physical

Which of the following is used to shift the impact of a threat to a third party, together with the ownership of the response?

A.

Risk mitigation

B.

Risk avoidance

C.

Risk acceptance

D.

Risk transference

You work as an Information Security Manager for uCertify Inc. You have been assigned the task to list down all procedures included in control A.7.2.2 of the ISO standard. Which of the following procedures are included in control A.7.2.2?

Each correct answer represents a complete solution. Choose all that apply.

A.

Storage

B.

Encryption

C.

Destruction

D.

Acquisition of information

Which of the following is the method of hiding data within another media type such as graphic or document?

A.

Steganography

B.

Packet sniffing

C.

Cryptanalysis

D.

Spoofing

Which of the following is a technique for a threat, which creates changes to the project management plan?

A.

Risk transference

B.

Risk avoidance

C.

Risk mitigation

D.

Risk acceptance

Which of the following defines the amount of data loss a business can endure?

A.

RTA

B.

RTO

C.

RPO

D.

BCP