Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The stronger points of CRAMM assist prioritization by providing a countermeasure with high priority if some conditions are met. Which of the following are these conditions?

Each correct answer represents a complete solution. Choose all that apply.

A.

It requires protecting a high risk system.

B.

It does not require the installation of alternative countermeasures.

C.

It is inexpensive to implement.

D.

It provides protection against several threats.

Which of the following is the process of removing sensitive information from a document or any other medium, so that it may be distributed to a broader audience?

A.

Sanitization

B.

Censorship

C.

Pixelization

D.

Data remanence

You work as an Information Security Manager for uCertify Inc. You are working on a project related to communications and operations management. Which of the following controls of the ISO standard is concerned with operational procedures and responsibilities?

A.

Control A.10.1

B.

Control A.7.1

C.

Control A.8.1

D.

Control A.9.2

Business Continuity Planning (BCP) determines the risks to the organizational processes and creates policies, plans, and procedures in order to minimize the impact of those risks. What are the different steps in the Business Continuity Planning process?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Business Analysis

B.

Continuity planning

C.

Project scope and planning

D.

Approval and implementation

E.

Business Impact Assessment

In which of the following does CRAMM provide assistance?

Each correct answer represents a complete solution. Choose all that apply.

A.

Audits

B.

Contingency planning

C.

US7799 certification

D.

BS7799 certification

Mark works as a Security Administrator for uCertify Inc. For the last few days, he is getting an error message, i.e., 'Remove the Boot.ini file because it is harmful for operating system'. When Mark reads about the Boot.ini file, he finds that it is a system file that is used to load the operating system on a computer. Which of the following types of virus has attacked Mark's computer?

A.

Polymorphic

B.

Hoax

C.

Macro

D.

Multipartite

Fill in the blank with an appropriate phrase.

_________accord describes the minimum regulatory capital to be allocated by each bank based on its risk profile of assets.

Fill in the blank with the appropriate term.

___________is the built-in file encryption tool for Windows file systems. It protects encrypted files from those who have physical possession of the computer where the encrypted files are stored.

Which of the following are the two methods that are commonly used for applying mandatory access control?

Each correct answer represents a complete solution. Choose all that apply.

A.

Lattice-based access control

B.

Attribute-based access control

C.

Rule-based access control

D.

Discretionary access control

Mark works as a Network Security Administrator for uCertify Inc. He has been assigned the task of installing a MySQL server. Mark wants to monitor only the data that is directed to or originating from the server and he also wants to monitor running processes, file system access and integrity, and user logins for identifying malicious activities. Which of the following intrusion detection techniques will Mark use to accomplish the task?

A.

Network-based IDS

B.

Signature-based IDS

C.

Anomaly-based IDS

D.

Host-based IDS