Which of the following are common failures that should be addressed in an organization's Business Continuity Plan (BCP) ? (Choose THREE.)
You are preparing a machine that will be used as a dedicated Web server. Which of the following services should NOT be removed?
A(n) _______________ is an abstract machine, which mediates all access subjects have to objects.
Which of the following calculations is used when selecting countermeasures?
To protect its information assets, ABC Company purchases a safeguard that costs $60,000. The annual cost to maintain the safeguard is estimated to be $40,000. The aggregate Annualized Loss Expectancy for the risks the safeguard is expected to mitigate is $50,000.
At this rate of return, how long will it take ABC Company to recoup the cost of the safeguard?
Which of the following best describes the largest security challenge for Remote Offices/Branch Offices?
The items listed below are examples of ___________________ controls.
*Procedures and policies
*Employee security-awareness training
*Employee background checks
*Increasing management security awareness
Which of the following is likely in a small-business environment?
____________________ are the people who consume, manipulate, and produce information assets.
_______ is a method of tricking users into revealing passwords, or other sensitive information.
Which of the following is the BEST method for managing users in an enterprise?
Which of the following is the MOST important consideration, when developing security- awareness training materials?
Which of these strategies can be employed to test training effectiveness? (Choose THREE.)
_______ intrusion detection involves comparing traffic to known characteristics of malicious traffic, known as attack signatures.
_______ is the process of confirming that implemented security safeguards work as expected.