New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following types of social engineering attacks is a term that refers to going through someone's trash to find out useful or confidential information?

A.

Authorization by third party

B.

Dumpster diving

C.

Shoulder surfing

D.

Important user posing

Which of the following is a Restrict Anonymous registry value that allows users with explicit anonymous permissions?

A.

2

B.

3

C.

1

D.

0

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You are configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance.

A fault tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfil the requirement?

A.

RAID-1

B.

RAID-5

C.

RAID-4

D.

RAID-3

E.

RAID-0

Sam works as a Network Administrator for Blue Well Inc. The company decides to opt for a strategy of a mix of measures to minimize risks. A stand-by arrangement is organized for the company. To which of the following categories of measures does a stand-by arrangement belong?

A.

Corrective measures

B.

Detective measures

C.

Repressive measures

D.

Preventive measures

A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following are the parts of a project plan?

Each correct answer represents a complete solution. Choose all that apply.

A.

Risk identification

B.

Security Threat

C.

Project schedule

D.

Team members list

E.

Risk analysis

Which of the following are the exceptions of the Data Protection Act?

Each correct answer represents a complete solution. Choose all that apply.

A.

Section 36 - Domestic purposes

B.

Section 28 - National security

C.

Section 55 - Unlawful obtaining of personal data

D.

Section 29 - Crime and taxation

Which of the following statements is true about Return On Investment?

A.

It is the difference between the benefit achieved and the amount spent to achieve that benefit; it is expressed as a percentage.

B.

It is the extra value produced by establishment of benefits that include long-term outcomes. ROI is a sub-component of VOI.

C.

It is the profit achieved through realization of improvements.

D.

It is the outcome that is once compared to the earlier state, which shows a computable increase in a desirable metric or decrease in an undesirable metric.

Which of the following are the variables on which the structure of Service Level Agreement depends?

Each correct answer represents a complete solution. Choose all that apply.

A.

It depends on the cultural aspects.

B.

It depends on the infrastructure aspects of the organization.

C.

It depends on the nature of the business activities, in terms of general terms and conditions, and business hours.

D.

It depends on the physical aspects of the organization.

You work as an Information Security Manager for uCertify Inc. The company has made a contract with a third party software company to make a software program for personal use. You have been assigned the task to share the organization's personal requirements regarding the tool to the third party. Which of the following documents should be first signed by the third party?

A.

Non disclosure agreement (NDA)

B.

Acknowledgement papers

C.

Copyright papers

D.

Legal disclaimer

Which of the following are the various types of risk analysis?

Each correct answer represents a complete solution. Choose all that apply.

A.

Corrective

B.

Quantitative

C.

Repressive

D.

Qualitative