question archive Question 21 : Separation of duties comes under which of the following access controls? This task contains the radio buttons and checkboxes for options
Subject:Computer SciencePrice: Bought3
Question 21 : Separation of duties comes under which of the following access controls?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Directive
B
Preventive
C
Corrective
D
Detective
22.Which of the following is not considered an example of data hiding?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Preventing an authorized reader of an object from deleting that object
B
Keeping a database from being accessed by unauthorized visitors
C
Restricting a subject at a lower classification level from accessing data at a higher classification level
D
Preventing an application from accessing hardware directly
23.What element of data categorization management can override all other forms of access control?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Taking ownership
B
Classification
C
Physical access
D
Custodian responsibilities
24.A portion of the __________________ is the logical and practical investigation of business processes and organizational policies. This process/policy review ensures that the stated and implemented business tasks, systems, and methodologies are practical, efficient, and cost-effective, but most of all (at least in relation to security governance) that they support security through the reduction of vulnerabilities and the avoidance, reduction, or mitigation of risk.
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Documentation review
B
Countermeasure selection
C
Risk aversion process
D
Hybrid assessment
25.Question 25 :
What process or event is typically hosted by an organization and is targeted to groups of employees with similar job functions?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Awareness
B
Training
C
Termination
D
Education
26.Which of the following concepts represent the three fundamental principles of information security?
Each correct answer represents a complete solution. Choose all that apply.
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Privacy
B
Integrity
C
Confidentiality
D
Availability
27.While performing a risk analysis, you identify a threat of fire and a vulnerability because there are no fire extinguishers. Based on this information, which of the following is a possible risk?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
System malfunction
B
Damage to equipment
C
Virus infection
D
Unauthorized access to confidential information
28.Question 28 :
Which of the following is a primary purpose of an exit interview?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
To evaluate the exiting employee's performance
B
To cancel the exiting employee's network access accounts
C
To return the exiting employee's personal belongings
D
To review the nondisclosure agreement
29.Which type of security plan is designed to be a forwarding looking document pointing out goals to achieve in a five-year time frame?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Operational
B
Tactical
C
Strategic
30.Which policy discusses activities and behaviors that are acceptable and defines consequences of violations, within an organization?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
Acceptable use
B
Informative
C
Advisory
D
Regulatory