You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?
Which of the following command line tools are available in Helix Live acquisition tool on Windows?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following TCB components is a hardware, firmware, and software element that
implements the reference monitor concept?
Which of the following cryptographic system services ensures that the information will not be disclosed to any unauthorized person on a local network?
Fill in the blank with the appropriate phrase.
____________ privilege escalation is the process of attempting to access sources with a higher access, such as a user account trying to access admin privileges.
Which of the following documents is necessary to continue the business in the event of disaster or emergency?
You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?
Which of the following terms describes the determination of the effect of changes to the
information system on the security of the information system?
Which of the following plans provides procedures for recovering business operations immediately following a disaster?
Which of the following procedures is to reduce the risk to personnel, property, and other assets while minimizing work disorders in the event of an emergency?
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?
Which of the following cryptographic system services ensures that the information will not be disclosed to any unauthorized person on a local network?
A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following are the parts of a project plan?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following Tier 1 policies will identify who is responsible for what?
Which of the following processes involves taking measures to alter or improve the risk position of an asset throughout the company?
Software Development Life Cycle (SDLC) is a logical process used by the programmers to develop software. Which SDLC phase meets the following audit objectives? l System and data are validated. l System meets all user requirements.
l System meets all control requirements.
Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?
ISO 17799 has two parts. The first part is an implementation guide with guidelines on how to build a comprehensive information security infrastructure and the second part is an auditing guide based on requirements that must be met for an organization to be deemed compliant with ISO 17799. What are the ISO 17799 domains?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following BCP teams assesses the damage of the disaster in order to provide the estimate of the time required to recover?
Which of the following sources is the best for developing Recovery Time Objectives (RTO)?
You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?
Which of the following steps has the goal to reduce the level of risk to the IT system and its data to an acceptable level?
Which of the following terms best describes the presence of any potential event that causes an undesirable impact on the organization?
Which of the following statements about disaster recovery plan documentation are true?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements about a certification authority (CA) is true?
Which of the following are common applications that help in replicating and protecting critical information at the time of disaster?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?
In which of the following scenarios is database backup transferred to a remote site in a bulk
transfer fashion?
Which of the following security procedures is related to the SDLC's implementation?
Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?
You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?
Which of the following authorizes and documents all the changes in the IT Infrastructure and its components (Configuration Items) in order to maintain a minimum amount of interruptive effects upon the running operation?
Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?
Which of the following sources is the best for developing Recovery Time Objectives (RTO)?
Which of the following global (Tier 1) policies de?nes what speci?cally the policy is going to
address?
Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months and six months already passed. Management asks Mark that how often the project team is participating in the risk reassessment of this project. What should Mark tell management if he is following the best practices for risk management?
You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?
Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms?
Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?
Fill the measurement of SFX form factor style power supply in the blank space.
The SFX form factor style power supply is ___________mm wide, mm deep, and mm in height.
You are responsible for network and information security at a large hospital. It is a significant concern that any change to any patient record can be easily traced back to the person who made that change. What is this called?
Drag and drop the appropriate team names in front of their respective responsibilities.
Which of the following types of agreement can be a legally binding formal or informal "contract"?
Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?
Which of the following documents helps disaster recovery team members in getting the alternate sites up and running?
Software Development Life Cycle (SDLC) is a logical process used by the programmers to develop software. Which SDLC phase meets the following audit objectives?
System and data are validated.
System meets all user requirements.
System meets all control requirements.
Which of the following governance bodies provides management, operational, and technical controls to satisfy the security requirements?
Which of the following actions can be performed by using the principle of separation of duties?
You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?
Which of the following measurements of a disaster recovery plan are aimed at detecting unwanted events?
Which of the following is a category of an automated Incident detection process?
Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?
Which of the following measurements of a disaster recovery plan are aimed at detecting unwanted events?
Which of the following events occurs in a system when there is a TCB failure and the recovery
procedures cannot return the system to a secure state?
Which of the following processes measures the maturity level of the security program?
Which of the following actions can be performed by using the principle of separation of duties?
You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the
decomposition process of a verification system into Configuration Items?
Which of the following values must ensure that the Maximum Tolerable Period of Disruption
(MTPD) for each activity is not exceeded?
Which of the following acts of information security governance affects the financial institutions?
Which of the following plans provides procedures for recovering business operations immediately following a disaster?
Fill the appropriate power supply form factor in the blank space.
_________form factor is similar to LPX form factor in physical dimensions.
Which of the following measurements of a disaster recovery plan are aimed at avoiding an event from occurring?
Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?
Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?
Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?
Which of the following phases involves getting the final senior management signoff and creating enterprise-wide awareness of the plan?
Which of the following systems helps to detect the "abuse of privileges" attack that does not
actually involve exploiting any security vulnerability?
Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms?
Which of the following phases is the first step towards creating a business continuity plan?
Which of the following statements are true about an APW (Air Pressurized Water) extinguisher?
Each correct answer represents a complete solution. Choose all that apply.
You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?
You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?
Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?
Which of the following are some of the parts of a project plan?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following types of storage requires some direct human action in order to make
access to the storage media physically possible?
You are the project manager for a construction project. The project involves casting of a column in a very narrow space. Because of the lack of space, casting is highly dangerous. High technical skill will be required for casting that column. You decide to hire a local expert team for casting that column. Which of the following types of risk response are you following?
Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question?
Each correct answer represents a part of the solution. Choose three.
Which of the following Tier 1 policies will identify who is responsible for what?
Which of the following processes measures the maturity level of the security program?