Which of the following documents is necessary to continue the business in the event of disaster or emergency?
Fill in the blank:
A ___________plan is a plan devised for a specific situation when things could go wrong.
Against which of the following does SSH provide protection?
Each correct answer represents a complete solution. Choose two.
Which of the following response teams aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large?
Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?
Fill the measurement of SFX form factor style power supply in the blank space.
The SFX form factor style power supply is ___________mm wide, mm deep, and mm in height.
Which of the following statements about disaster recovery plan documentation are true? Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements about disaster recovery plan documentation are true?
Each correct answer represents a complete solution. Choose all that apply.
Fill in the blank with the appropriate number:
RAID-________ is a combination of RAID-1 and RAID-0.
Which of the following phases is the first step towards creating a business continuity plan?
Which of the following parts of BS 7799 covers risk analysis and management?
Which of the following roles is responsible for the review and risk analysis of all the contracts on regular basis?
Which of the following values must ensure that the Maximum Tolerable Period of Disruption
(MTPD) for each activity is not exceeded?
Fill in the blank with the appropriate number:
RAID-______is a combination of RAID-1 and RAID-0.
Which of the following levels of RAID provides security features that are availability, enhanced performance, and fault tolerance?
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?
Which of the following BCP teams handles financial arrangement, public relations, and media inquiries in the time of disaster recovery?
Which of the following processes is used by organizations to set the risk tolerance, identify the potential risks, and prioritize the tolerance for risk?
You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?
Which of the following concepts represent the three fundamental principles of information security?
Each correct answer represents a complete solution. Choose three.
Which of the following cryptographic system services assures the receiver that the received message has not been altered?
Which of the following BCP teams handles financial arrangement, public relations, and media inquiries in the time of disaster recovery?
Which of the following terms describes the determination of the effect of changes to the
information system on the security of the information system?
Which of the following statements are true about an APW (Air Pressurized Water) extinguisher?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following processes identifies the threats that can impact the business continuity of operations?
Which of the following processes involves taking measures to alter or improve the risk position of an asset throughout the company?
Which of the following sets of incident response practices is recommended by the CERT/CC?
Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?
Which of the following types of control gives an instance of the audit log?
A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following are the parts of a project plan?
Each correct answer represents a complete solution. Choose all that apply.
John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.
Which of the following values specifies the acceptable latency of data that will be recovered?
Which of the following tasks is prioritized the most by the information security strategy?
Which of the following strategies is used to minimize the effects of a disruptive event on a
company, and is created to prevent interruptions to normal business activity?
Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?
Which of the following statements about a certification authority (CA) is true?
Which of the following backup sites is the best way for rapid recovery if you do not need the full recovery temporarily?
Which of the following control measures are considered while creating a disaster recovery plan?
Each correct answer represents a part of the solution. Choose three.