Which of the following features of the Cisco MDS 9000 SAN Extension over IP Package help in implementing efficient FCIP-based business-continuity and disaster-recovery solutions?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following phases is the first step towards creating a business continuity plan?
Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?
Which of the following classification schemes is considered to be of a personal nature and is
intended for company use only?
Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?
Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?
Which of the following security procedures is related to the SDLC's implementation?
Fill in the blank with the appropriate phrase.
__________________ is the process of obtaining access using legitimate credentials, and then attempting to leverage that into access to unauthorized system resources.
Which of the following statements are true about an APW (Air Pressurized Water) extinguisher?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following roles is responsible for the review and risk analysis of all the contracts on regular basis?
You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?
Which of the following levels of RAID provides security features that are availability, enhanced performance, and fault tolerance?
Which of the following events occurs in a system when there is a TCB failure and the recovery
procedures cannot return the system to a secure state?
In risk analysis, which of the following can be identified as a consequence of a disaster?
Fill in the blank:
An ___________________ (AS) is a group of networks under a single administration and with single routing policies.
Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?
Which of the following security procedures is related to the SDLC's implementation?
Which of the following individuals incorporates risk assessment in training programs for the
organization's personnel?
Fill in the blank:
A______plan is a plan devised for a specific situation when things could go wrong.
You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?
Which of the following individuals incorporates risk assessment in training programs for the
organization's personnel?
Which of the following are some of the parts of a project plan?
Each correct answer represents a complete solution. Choose all that apply.
The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?
Which of the following statements best describes the difference between the role of a data owner and the role of a data custodian?
Joseph is a merchant. He lives in an area that is prone to natural disasters. What will he do to save his data from a disaster?
Software Development Life Cycle (SDLC) is a logical process used by the programmers to develop software. Which SDLC phase meets the following audit objectives? l System and data are validated. l System meets all user requirements.
l System meets all control requirements.
Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?
Which of the following plans provides procedures for disseminating status reports to personnel and the public?
Which of the following documents helps disaster recovery team members in getting the alternate sites up and running?
Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?
You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?
BS 7799 is an internationally recognized ISM standard that provides high level, conceptual recommendations on enterprise security. BS 7799 is basically divided into three parts. Which of the following statements are true about BS 7799?
Each correct answer represents a complete solution. Choose all that apply.
Drag and drop the appropriate team names in front of their respective responsibilities.
Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?
Which of the following sources is the best for developing Recovery Time Objectives (RTO)?
Fill in the blank:
An______(AS) is a group of networks under a single administration and with
single routing policies.
Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?