question archive Question 21 : Separation of duties comes under which of the following access controls? This task contains the radio buttons and checkboxes for options

Question 21 : Separation of duties comes under which of the following access controls? This task contains the radio buttons and checkboxes for options

Subject:Computer SciencePrice: Bought3

Question 21 : Separation of duties comes under which of the following access controls?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Directive

B

Preventive

C

Corrective

D

Detective

22.Which of the following is not considered an example of data hiding?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Preventing an authorized reader of an object from deleting that object

B

Keeping a database from being accessed by unauthorized visitors

C

Restricting a subject at a lower classification level from accessing data at a higher classification level

D

Preventing an application from accessing hardware directly

23.What element of data categorization management can override all other forms of access control?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Taking ownership

B

Classification

C

Physical access

D

Custodian responsibilities

24.A portion of the __________________ is the logical and practical investigation of business processes and organizational policies. This process/policy review ensures that the stated and implemented business tasks, systems, and methodologies are practical, efficient, and cost-effective, but most of all (at least in relation to security governance) that they support security through the reduction of vulnerabilities and the avoidance, reduction, or mitigation of risk.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Documentation review

B

Countermeasure selection

C

Risk aversion process

D

Hybrid assessment

25.Question 25 :

What process or event is typically hosted by an organization and is targeted to groups of employees with similar job functions?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Awareness

B

Training

C

Termination

D

Education

26.Which of the following concepts represent the three fundamental principles of information security?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Privacy

B

Integrity

C

Confidentiality

D

Availability

27.While performing a risk analysis, you identify a threat of fire and a vulnerability because there are no fire extinguishers. Based on this information, which of the following is a possible risk?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

System malfunction

B

Damage to equipment

C

Virus infection

D

Unauthorized access to confidential information

28.Question 28 :

Which of the following is a primary purpose of an exit interview?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

To evaluate the exiting employee's performance

B

To cancel the exiting employee's network access accounts

C

To return the exiting employee's personal belongings

D

To review the nondisclosure agreement

29.Which type of security plan is designed to be a forwarding looking document pointing out goals to achieve in a five-year time frame?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Operational

B

Tactical

C

Strategic

30.Which policy discusses activities and behaviors that are acceptable and defines consequences of violations, within an organization?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Acceptable use

B

Informative

C

Advisory

D

Regulatory

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE