Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

There are three states in which data can exist:

A.

at dead, in action, in use.

B.

at dormant, in mobile, in use.

C.

at sleep, in awake, in use.

D.

at rest, in transit, in use.

The hash function supports data in transit by ensuring:

A.

validation that a message originated from a particular user.

B.

a message was modified in transit.

C.

a public key is transitioned into a private key.

D.

encrypted messages are not shared with another party.

What does non-repudiation mean in the context of web security?

A.

Ensuring that all traffic between web servers must be securely encrypted

B.

Providing permission to use web server resources according to security policies and specified procedures, so that the activity can be audited

C.

Ensuring that all data has not been altered in an unauthorized manner while being transmitted between web servers

D.

Providing the sender of a message with proof of delivery, and the receiver with proof of the sender's identity

Violations of the EU’s General Data Protection Regulations GDPR can result in:

A.

mandatory upgrades of the security infrastructure.

B.

fines of €20 million or 4% of annual turnover, whichever is less.

C.

fines of €20 million or 4% of annual turnover, whichever is greater.

D.

a complete audit of the enterprise’s security processes.

Why would a Business Analyst include current technology when documenting the current state business processes surrounding a solution being replaced?

A.

To ensure the future state business processes are included in user training

B.

To identify potential security impacts to integrated systems within the value chain

C.

To identify and meet internal security governance requirements

D.

To classify the data elements so that information confidentiality, integrity, and availability are protected

What business analysis deliverable would be an essential input when designing an audit log report?

A.

Access Control Requirements

B.

Risk Log

C.

Future State Business Process

D.

Internal Audit Report

Separation of duties, as a security principle, is intended to:

A.

optimize security application performance.

B.

ensure that all security systems are integrated.

C.

balance user workload.

D.

prevent fraud and error.

How is a risk score calculated?

A.

Based on the confidentiality, integrity, and availability characteristics of the system

B.

Based on the combination of probability and impact

C.

Based on past experience regarding the risk

D.

Based on an assessment of threats by the cyber security team

What should organizations do with Key Risk Indicator KRI and Key Performance Indicator KPI data to facilitate decision making, and improve performance and accountability?

A.

Achieve, reset, and evaluate

B.

Collect, analyze, and report

C.

Prioritize, falsify, and report

D.

Challenge, compare, and revise

How does Transport Layer Security ensure the reliability of a connection?

A.

By ensuring a stateful connection between client and server

B.

By conducting a message integrity check to prevent loss or alteration of the message

C.

By ensuring communications use TCP/IP

D.

By using public and private keys to verify the identities of the parties to the data transfer