New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which document serve as specifications for the implementation of policy and dictates mandatory requirements

A.

Policy

B.

Guideline

C.

Standard

D.

Procedures

A cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites

A.

Phising

B.

Virus

C.

Spoofing

D.

DDOS

The documentation of a predetermined set of instructions or procedures to detect, respond to andlimit consequences of a malicious cyberattack against an organization's information systems(s).

A.

IR

B.

IRP

C.

BCP

D.

DRP

Configuration settings or parameters stored as data, managed through a software graphical user interface (GUI) is

A.

Logical access control

B.

Physical access control

C.

Administrative Access control

Requires that all instances of the data be identical in form,

A.

Confidentiality

B.

Availability

C.

Consistency

D.

ALL

are events that may indicate that an organization's systems or data have been compromised or that measures put in place to protect them have failed

A.

Exploit

B.

Security Incident

C.

Threat

D.

Rreach

What does the concept of integrity applied to

A.

Organization

B.

Information system and processes for business operations

C.

People

D.

ALL

Which of the following is the least secure communications protocol?

A.

CHAP

B.

Ipsec

C.

PAP

D.

EAP

Which phase of the access control process(AAA) does a user prove his/her identity?

A.

Authentication

B.

Authorization

C.

Identification

D.

Accounting

The common term used to describe the mechanisms that control the temperature and humidity in a data center

A.

VLAN (virtual local area network)

B.

STAT (system temperature and timing)

C.

TAWC (temperature and water control)

D.

HVAC (heating, ventilation and air conditioning)