New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following states that a user should never be given more privileges than are required to carry out a task?

A.

Principle of least privilege

B.

Segregation of duties

C.

Security through obscurity

D.

Role-based security

Which of the following formulas is used to represent the annualized loss expectancy (ALE)?

A.

ALE=asset value ($)*exposure factor (EF)

B.

ALE=single loss expectancy (SLE)/annualized rate of occurrence (ARO)

C.

ALE=asset value ($)/exposure factor (EF)

D.

ALE=single loss expectancy (SLE)*annualized rate of occurrence (ARO)

John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Hybrid attack

B.

Brute Force attack

C.

Dictionary attack

D.

Rule based attack

Sam uses Monte Carlo simulation to quantitatively assess cost and schedule risks of his project during planning processes. During risk monitoring and control, Sam repeats the technique, but it leads to different results. Which of the following cannot be the reason for the difference in results?

Which of the following roles is responsible for the review and risk analysis of all the contracts on regular basis?

A.

The IT Service Continuity Manager

B.

The Configuration Manager

C.

The Supplier Manager

D.

The Service Catalogue Manager

You work as a Security Administrator for uCertify Inc. You have developed a user manual for internal use, which will help your colleagues to work efficiently in the organization. However, you are concerned about the possibility of the user manual being distributed to the public. Therefore, you have decided to implement a system of classification so that you can secure information.

Which of the following information classification levels will you use to implement the system?

A.

Department specific

B.

Public or unclassified

C.

Private or confidential

D.

Classified

Which of the following is used to shift the impact of a threat to a third party, together with the ownership of the response?

A.

Risk avoidance

B.

Risk transference

C.

Risk mitigation

D.

Risk acceptance

Which of the following is NOT a module of FaultTree+?

A.

Kerchief Analysis

B.

Fault Tree Analysis

C.

Event Tree Analysis

D.

Markov Analysis

Which of the following is a measure taken by a program to protect the system against misuse of itself?

A.

Privilege separation

B.

Privilege bracketing

C.

Privilege escalation

D.

Privilege revocation

You work as a Network Administrator for uCertify Inc. You are responsible for selecting the access control method that will be used for kiosk system software. Your manager wants to have full access to all information about all categories, but the visitors can access only general information about the organization. Which of the following types of access controls is suitable to accomplish this task?

A.

Attribute-based access control

B.

Rule-based access control

C.

Discretionary access control

D.

Mandatory access control