Which of the following plans provides procedures for disseminating status reports to personnel and the public?
In which of the following prototyping, a prototype of a system is built and then evolves into the final system?
Which of the following cryptographic system services ensures that the information will not be disclosed to any unauthorized person on a local network?
Organizations must assess the safety of their workplaces and consider the ability of a business to continue despite risk impact. When assessing business continuity risks, the HR Professional must consider several different types of disasters, their probability, and impact on an organization. What category of disaster is best described as acts of terrorism, major thefts, sabotage, or labor disputes?
Which of the following BCP teams handles financial arrangement, public relations, and media inquiries at the time of disaster recovery?
Which of the following types of controls focuses on stopping a security breach from taking place in the ?rst place?
Which of the following documents is necessary to continue the business in the event of disaster or emergency?
Which of the following sites is a non-mainstream alternative to a traditional recovery site?
You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?
Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?
Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?
Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?
Which of the following best describes the identification, analysis, and ranking of risks?
Which of the following security procedures is related to the SDLC's implementation?
Which of the following processes involves taking measures to alter or improve the risk position of an asset throughout the company?
Which of the following plans provides procedures for recovering business operations immediately following a disaster?
Fill in the blank:
An______(AS) is a group of networks under a single administration and with
single routing policies.
Which methodology is a method to analyze the involved tasks in completing a given project, especially the time needed to complete each task, and identifying the minimum time needed to complete the total project?
Which of the following sets of incident response practices is recommended by the CERT/CC?
Which of the following is established during the Business Impact Analysis by the owner of a process in accepted business continuity planning methodology?
Which of the following documents is necessary to continue the business in the event of disaster or emergency?
Which of the following phases is the first step towards creating a business continuity plan?
Which of the following BCP teams handles financial arrangement, public relations, and media inquiries in the time of disaster recovery?
ISO 17799 has two parts. The first part is an implementation guide with guidelines on how to build a comprehensive information security infrastructure and the second part is an auditing guide based on requirements that must be met for an organization to be deemed compliant with ISO 17799. What are the ISO 17799 domains?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following roles is responsible for the review and risk analysis of all the contracts on regular basis?
Which of the following backup sites is the best way for rapid recovery if you do not need the full recovery temporarily?
Which of the following options is an intellectual property right to protect inventions?
Which of the following sub-processes of IT Service Continuity Management is used to make sure that all members of IT staff with responsibilities for fighting disasters are aware of their exactduties?
Which of the following phases is the first step towards creating a business continuity plan?
Fill the appropriate power supply form factor in the blank space.
_________form factor is similar to LPX form factor in physical dimensions.
Which of the following are common applications that help in replicating and protecting critical information at the time of disaster?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following response teams aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large?
Which of the following actions can be performed by using the principle of separation of duties?
Which of the following statements are true about classless routing protocols?
Each correct answer represents a complete solution. Choose two.
Which of the following procedures is to reduce the risk to personnel, property, and other assets while minimizing work disorders in the event of an emergency?