question archive 31) Which of the following focuses on verifying compliance with stated security objectives, requirements, regulations, and contractual obligations? This task contains the radio buttons and checkboxes for options

31) Which of the following focuses on verifying compliance with stated security objectives, requirements, regulations, and contractual obligations? This task contains the radio buttons and checkboxes for options

Subject:Computer SciencePrice: Bought3

31) Which of the following focuses on verifying compliance with stated security objectives, requirements, regulations, and contractual obligations?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Ownership

B

Data classification

C

Third-party governance

D

Procedure

32.When a safeguard or a countermeasure is not present or is not sufficient, what remains?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Penetration

B

Risk

C

Exposure

D

Vulnerability

33.When evaluating safeguards, what is the rule that should be followed in most cases?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

The annual costs of safeguards should not exceed 10 percent of the security budget.

B

The expected annual cost of asset loss should not exceed the annual costs of safeguards.

C

The annual costs of safeguards should equal the value of the asset.

D

The annual costs of safeguards should not exceed the expected annual cost of asset loss.

34.Which of the following is defined as the cost related to only one realized risk against a particular asset?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Exposure factor

B

Annualized rate of occurrence

C

Single loss expectancy

D

Annualized loss expectancy

35.The exposure factor is defined as the percentage of loss experienced by an organization when a specific asset is violated by a realized risk. Which of the following statements are true of the exposure factor?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Its value is small for assets that can be easily replaced, for example hardware.

B

Its value is large for assets that cannot be replaced, for example product designs, or a database of customers.

C

It is the expected frequency of occurrence of a particular threat or risk in a single year.

D

It is also known as the loss potential.

36.Mark reads the following lines in the document from his workstation:

  1. Access the Aspen Bridge by telnet.
  2. Enter into privileged mode.
  3. Execute command 6 and press Enter.
  4. Load the config file.
  5. Hit Run.

What type of document is Mark reading?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Security policy

B

Procedure

C

Guideline

D

Regulatory policy

37.A security policy is defined as the document that describes the scope of an organization's security requirements. Which of the following statements are true of a security policy?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

It provides security solutions to provide necessary protection against security threats.

B

It includes assets that are to be protected.

C

It uses public key cryptography to digitally sign records for a DNS lookup.

D

It facilitates slave DNS servers to transfer records from the master server to a slave server.

38.Question 40 :

Which of the following is not an element of the risk analysis process?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Creating a cost/benefit report for safeguards to present to upper management

B

Selecting appropriate safeguards and implementing them

C

Evaluating each threat event as to its likelihood of occurring and cost of the resulting damage

D

Analyzing an environment for risks

39.

Question 41 :

By using which analysis does a group reach an anonymous consensus while all members of that group are in the same room?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Survey

B

Delphi technique

C

Brainstorming

D

Storyboarding

40.Which of the following approaches should you consider while preparing and conducting a risk assessment?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Create a business continuity plan.

B

Create a regulatory policy.

C

Identify a consistent risk assessment methodology.

D

Perform the risk and vulnerability assessment as per the defined standard.

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE