What are the steps related to the vulnerability management program? Each correct answer represents a complete solution. Choose all that apply.A . Maintain and MonitorB . Organization VulnerabilityC . Define PolicyD . Baseline the Environment
Which of the following statements about the integrity concept of information security management are true?Each correct answer represents a complete solution. Choose three.A . It ensures that unauthorized modifications are not made to data by authorized personnel or processes.B . It determines the actions and behaviors of a single individual within a systemC . It ensures that modifications are not made to data by unauthorized personnel or processes.D . It ensures that internal information is consistent among all subentities and also consistent with the real-world, external situation.
Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?A . SSAAB . FITSAFC . FIPSD . TCSEC
Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?A . Configuration Verification and AuditingB . Configuration Item CostingC . Configuration IdentificationD . Configuration Status Accounting
John is a black hat hacker. FBI arrested him while performing some email scams. Under which of the following US laws will john be charged?A . 18 U.S.C. 1362B . 18 U.S.C. 1030C . 18 U.S.C. 2701D . 18 U.S.C. 2510
Which of the following are the types of access controls?Each correct answer represents a complete solution. Choose three.A . AdministrativeB . AutomaticC . PhysicalD . Technical
Which of the following methods can be helpful to eliminate social engineering threat? Each correct answer represents a complete solution. Choose three.A . Password policiesB . Vulnerability assessmentsC . Data encryptionD . Data classification
Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?A . Utility modelB . CookieC . CopyrightD . Trade secret
How many change control systems are there in project management?A . 3B . 4C . 2D . 1
Which of the following terms related to risk management represents the estimated frequency at which a threat is expected to occur?A . SafeguardB . Single Loss Expectancy (SLE)C . Exposure Factor (EF)D . Annualized Rate of Occurrence (ARO)