Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Analyst B has discovered multiple sources which can harm the organization’s systems. What has she discovered?

A.

Breach

B.

Hacker

C.

Threat

D.

Ransomware

If a system contains data with differing security categories, how should this be addressed in the categorization process?

A.

Security for the system should be in line with the highest impact value across all categories

B.

The data should be segregated across multiple systems so that they can have the appropriate security level for each

C.

The data types should be merged into a single category and reevaluated

D.

Security for the system should be in line with the lowest impact value across all categories

What terms are often used to describe the relationship between a sub-directory and the directory in which it is cataloged?

A.

Primary and Secondary

B.

Multi-factor Tokens

C.

Parent and Child

D.

Embedded Layers

Recovery Point Objectives and Recovery Time Objectives are based on what system attribute?

A.

Sensitivity

B.

Vulnerability

C.

Cost

D.

Criticality

What is the purpose of Digital Rights Management DRM?

A.

To ensure that all attempts to access information are tracked, logged, and auditable

B.

To control the use, modification, and distribution of copyrighted works

C.

To ensure that corporate files and data cannot be accessed by unauthorized personnel

D.

To ensure that intellectual property remains under the full control of the originating enterprise

Which scenario is an example of the principle of least privilege being followed?

A.

An application administrator has full permissions to only the applications they support

B.

All application and database administrators have full permissions to every application in the company

C.

Certain users are granted administrative access to their network account, in case they need to install a web-app

D.

A manager who is conducting performance appraisals is granted access to HR files for all employees

How should categorization information be used in business impact analysis?

A.

To identify discrepancies between the security categorization and the expected business impact

B.

To assess whether information should be shared with other systems

C.

To determine the time and effort required for business impact assessment

D.

To ensure that systems are designed to support the appropriate security categorization

Other than the Requirements Analysis document, in what project deliverable should Vendor Security Requirements be included?

A.

Training Plan

B.

Business Continuity Plan

C.

Project Charter

D.

Request For Proposals

What is a Recovery Point Objective RPO?

A.

The point in time prior to the outage to which business and process data must be recovered

B.

The maximum time a system may be out of service before a significant business impact occurs

C.

The target time to restore a system without experiencing any significant business impact

D.

The target time to restore systems to operational status following an outage

NIST 800-30 defines cyber risk as a function of the likelihood of a given threat-source exercising a potential vulnerability, and:

A.

the pre-disposing conditions of the vulnerability.

B.

the probability of detecting damage to the infrastructure.

C.

the effectiveness of the control assurance framework.

D.

the resulting impact of that adverse event on the organization.