Filters
Question type

__________ is a strategy of using multiple types of technology that prevent the failure of one system from compromising the security of information.


A) Firewalling
B) Hosting
C) Redundancy
D) Domaining

Correct Answer

verifed

verified

________ controls cover security processes that are designed by strategic planners and implemented by the security administration of the organization.


A) Managerial
B) Technical
C) Operational
D) Informational

Correct Answer

verifed

verified

____________________ controls are information security safeguards that focus on the application of modern technologies, systems, and processes to protect information assets.

Correct Answer

verifed

verified

____________________ management is an organization's set of planning and preparation efforts for dealing with potential human injury, emotional trauma, or loss of life as a result of a disaster.

Correct Answer

verifed

verified

To remain viable, security policies must have a responsible individual, a schedule of reviews, a method for making recommendations for reviews, and policy issuance and planned revision dates.

Correct Answer

verifed

verified

Managerial controls set the direction and scope of the security process and provide detailed instructions for its conduct.

Correct Answer

verifed

verified

The security model is the basis for the design, selection, and implementation of all security program elements, including policy implementation and ongoing policy and program management. _________________________

Correct Answer

verifed

verified

Every member of the organization's InfoSec department must have a formal degree or certification in information security.

Correct Answer

verifed

verified

A(n) ____________________ is a scripted description of an incident-usually just enough information so that each individual knows what portion of the IRP to implement, and not enough to slow down the notification process.

Correct Answer

verifed

verified

A(n) ____________________ is a detailed examination of the events that occurred from first detection to final recovery.

Correct Answer

verifed

verified

AAR
after-action rev...

View Answer

Guidelines are detailed statements of what must be done to comply with policy. _________________________

Correct Answer

verifed

verified

A disaster recovery plan shows the organization's intended efforts to restore operations at the original site in the aftermath of a disaster.

Correct Answer

verifed

verified

The transfer of large batches of data to an off-site facility, usually through leased lines or services, is called ____.


A) off-site storage
B) remote journaling
C) electronic vaulting
D) database shadowing

Correct Answer

verifed

verified

A standard is a written instruction provided by management that informs employees and others in the workplace about proper behavior.

Correct Answer

verifed

verified

NIST responded to a mandate and created a voluntary Risk Management Framework that provides an effective approach to manage cybersecurity risks. _________________________

Correct Answer

verifed

verified

A ____ site provides only rudimentary services and facilities.


A) commercial
B) warm
C) hot
D) cold

Correct Answer

verifed

verified

Implementing multiple types of technology and thereby precluding that the failure of one system will compromise the security of information is referred to as ____________________.

Correct Answer

verifed

verified

redundancy...

View Answer

RAID Level 1 is commonly called disk ____________________.

Correct Answer

verifed

verified

The operational plan documents the organization's intended long-term direction and efforts for the next several years. _________________________

Correct Answer

verifed

verified

Evidence is the physical object or documented information that proves an action occurred or identifies the intent of a perpetrator. _________________________

Correct Answer

verifed

verified

Showing 61 - 80 of 110

Related Exams

Show Answer