Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is the correct order of project phases?

A.

1)Initiation2)Executing3)Planning4)Monitoring and Controllings) Closing

B.

1) Planning2) InitiationAMonitoring and Controlling4) Executings) Closing

C.

1) Executing2) Monitoring and Controlling3) Initiation4) Planning5) Closing

D.

1) Initiation2) Planning° 3) Executing4) Monitoring and Controllings) Closing

Which data type should be used to calculate 90% of the retail price of an item?

A.

Floating-point

B.

String

C.

Boolean

D.

Auto-number

Which item is an input device?

A.

Printer

B.

Flash Drive

C.

CD

D.

Scanner

Which risk management strategy will secure an application from potential malware and advanced persistent threats?

A.

Encryption of all sensitive data stored within the application

B.

Configuration of the application to require strong, unique passwords for all user accounts

C.

Installation of the latest antivirus software on all computers that will access the application

D.

Implementation of a strict firewall policy to restrict access to the application's server

Which characteristic applies to machine-level languages?

A.

They use language translators known as compilers

B.

They use cables to connect circuits

C.

They use collection of short scripts

D.

They use language translators known as assemblers

An organization's board of directors is reviewing the risk register and attempting to evaluate whether there is too much risk for the organization.

Which metric should the board review?

A.

Risk appetite

B.

Risk evaluation plan

C.

Risk treatment plan

D.

Risk tolerance

An e-learning company uses Amazon Simple Storage Service (Amazon S3) to store e-books and video files that are served to customers through a custom application. The company has realized that someone has been stealing its intellectual property.

Which threat actor is most likely in this scenario?

A.

Advanced persistent threat

B.

Novice hacker

C.

Competitor

D.

Hacktivist

How can the organizational culture support ethical guidelines?

A.

By outlining the roles of IT specialists in the organization

B.

By outlining the protocols to support security and privacy of data

C.

By creating the system requirements for computers in the organization

D.

By creating the government regulations that apply to the organization

A company is looking to monitor and detect any suspicious activity on its servers. The company wants to implement a security solution that can detect any unauthorized access or unusual activity on the servers.

Which security technology will meet the needs of this company?

A.

Hardware security module (HSM)

B.

Two-factor authentication

C.

Antivirus tools

D.

Host-based intrusion detection system (HIDS)

Which stream cipher is a variant of the Salsa20 cipher, designed to be fast, secure, and resistant to cryptanalysis, and is commonly used in combination with the Poly1305 authentication mode?

A.

Counter (CTR)

B.

Cipher block chaining (CBC)

C.

ChaCha

D.

Electronic codebook (ECB)