Which of the following refers to an information security document that is used in the United
States Department of Defense (DoD) to describe and accredit networks and systems?
Answer : A
Change Management is used to ensure that standardized methods and procedures are used for efficient handling of all changes. Who decides the category of a change?
Answer : C
Which of the following refers to the ability to ensure that the data is not modified or tampered with?
Answer : C
Which of the following U.S. Federal laws addresses computer crime activities in communication lines, stations, or systems?
Answer : A
You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. Which of the following ideas will you consider the best when conducting a security awareness campaign?
Answer : C
You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers for the district they will need to be able to work from an alternate location.
However, budget is an issue. Which of the following is most appropriate for this client?
Answer : A
You are the project manager of the GHE Project. You have identified the following risks with the characteristics as shown in the following figure:
Answer : D
Which of the following is a name, symbol, or slogan with which a product is identified?
Answer : B
Fill in the blank with an appropriate word. _________ are used in information security to formalize security policies.
Answer : A
Your project team has identified a project risk that must be responded to. The risk has been recorded in the risk register and the project team has been discussing potential risk responses for the risk event. The event is not likely to happen for several months but the probability of the event is high. Which one of the following is a valid response to the identified risk event?
Answer : D
Which of the following needs to be documented to preserve evidences for presentation in court?
Answer : D
Which of the following laws is defined as the Law of Nations or the legal norms that has developed through the customary exchanges between states over time, whether based on diplomacy or aggression?
Answer : A
What are the purposes of audit records on an information system? Each correct answer represents a complete solution. Choose two.
Answer : A,B
Which of the following methods can be helpful to eliminate social engineering threat? Each correct answer represents a complete solution. Choose three.
Answer : A,B,D
Which of the following characteristics are described by the DIAP Information Readiness
Assessment function? Each correct answer represents a complete solution. Choose all that apply.
Answer : A,B,C