New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is the correct formula of single loss expectancy?

A.

SLE= Annualized rate of occurrence*exposure factor

B.

SLE=asset value*exposure factor

C.

SLE= exposure factor*exposure factor

D.

SLE= Annualized loss expectancy*exposure factor

Which of the following is used for secure financial transactions over the Internet?

A.

ATM

B.

VPN

C.

SSL

D.

SET

Which of the following is expressly set up to attract and trap people who attempt to penetrate other people's computer systems?

A.

Honeypot

B.

Internet bot

C.

Crawler

D.

Spider

You work as a Security Administrator for uCertify Inc. You need to make a documentation to provide ongoing education and awareness training of disciplinary actions of your company. What are the primary reasons to create this documentation?

Each correct answer represents a complete solution. Choose all that apply.

A.

To ensure that employees understand information security threats

B.

To ensure that employees have the necessary knowledge to mitigate security threats

C.

To ensure that employees are aware of and understand their roles and responsibilities

D.

To ensure that employees have the necessary knowledge about the company's forthcoming Projects

Which of the following operations are performed by the Identity Management Process?

Each correct answer represents a complete solution. Choose all that apply.

A.

Providing Single Sign-On access

B.

Making possible automated application provision

C.

Provisioning and coordinating user identities

D.

Ensuring secure deployment of applications

Which of the following should be considered while calculating the costs of the outage?

Each correct answer represents a complete solution. Choose all that apply.

A.

Sales aspect of the business

B.

Cost of low productivity

C.

Innovations in electronic funds transfer

D.

Cost of lost income from missed sales

Cigital Risk Management Method was developed by Gary McGraw of Cigital and John Viega of Stonewall Software, and it defines software security risk management process. Choose and re-order the risk management steps that are included in this method.

A.

You are working with a company that depends on real time data being available to employees, thus performance is an issue. They are trying to select the best method for handing the situation of a hard drive crashing. Which of the following would you recommend to them?

A.

RAID 2

B.

RAID 0

C.

RAID 1

D.

RAID 5

Which of the following are the uses of cryptography as defined in a policy document?

Each correct answer represents a complete solution. Choose all that apply.

A.

Backup

B.

Control of keys

C.

Applications supporting cryptography

D.

Recovery

You work as the Network Security Administrator for uCertify Inc. You are responsible for protecting your network from unauthorized access from both inside and outside the organization. For outside attacks, you have installed a number of security tools that protect your network. For internal security, employees are using passwords more than 8 characters; however, a few of them having the same designation often exchange their passwords, making it possible for others to access their accounts.

There is already a policy to stop this practice, but still employees are doing so. Now, you want to stop this and ensure that this never happens again. Which of the following will be the best step to stop this practice?

A.

Create a policy that forces users to create a password combined with special characters.

B.

Create a new policy that forces users to change their passwords once every 15 days.

C.

Create a policy to enter their employee code while logged in to the system.

D.

Create a policy to enter their personal email id while logged in to the system.