Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?
AAsterisk logger
BFAU
CAccess Pass View
DGalleta
0
Question 2
Risk Assessment
0
Question 3
Risk Assessment
0
Question 4
Disaster Recovery Planning Process
0
Question 5
Introduction to Disaster Recovery and Business Continuity
Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months and six months already passed. Management asks Mark that how often the project team is participating in the risk reassessment of this project. What should Mark tell management if he is following the best practices for risk management?
AAt every status meeting of the project team, project risk management is an agenda item.
BProject risk management happens at every milestone.
CProject risk management has been concluded with the project planning.
DProject risk management is scheduled for every month in the 18-month project.
You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?
AQuantitative analysis
BEstimate activity duration
CRisk identification
DQualitative analysis
Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question?
Each correct answer represents a part of the solution. Choose three.
AGuarantee the reliability of standby systems through testing and simulation.
BProtect an organization from major computer services failure.
CMinimize the risk to the organization from delays in providing services.
DMaximize the decision-making required by personnel during a disaster.
Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will he use to fulfill this requirement?
AAES
BDES
CIDEA
DPGP
Question 6
Business Impact Analysis and Business Continuity Plan
0
Question 7
BCP Testing, Maintenance, and Training
Question 8
Disaster Recovery Planning Process
Question 9
Risk Assessment
Question 10
Risk Assessment
Question 11
Introduction to Disaster Recovery and Business Continuity
Question 12
Risk Assessment
Question 13
Disaster Recovery Planning Process
Question 14
Business Impact Analysis and Business Continuity Plan
Question 15
Risk Assessment
Question 16
Data Backup Strategies
Question 17
Data Recovery Strategies
Question 18
Disaster Recovery Planning Process
Question 19
Disaster Recovery Planning Process
Question 20
Introduction to Disaster Recovery and Business Continuity
Question 21
Introduction to Disaster Recovery and Business Continuity
Question 22
Disaster Recovery Planning Process
Question 23
Introduction to Disaster Recovery and Business Continuity
Question 24
Disaster Recovery Planning Process
Question 25
Business Impact Analysis and Business Continuity Plan
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?
ADisaster Recovery Plan
BContinuity Of Operations Plan
CBusiness Continuity Plan
DContingency Plan
Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?
AEmergency management team
BDamage assessment team
COff-site storage team
DEmergency action team
Which of the following response teams aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large?
ACERT
BCSIRT
CFedCIRC
DFIRST
You are responsible for network and information security at a large hospital. It is a significant concern that any change to any patient record can be easily traced back to the person who made that change. What is this called?
AAvailability
BNon repudiation
CConfidentiality
DData Protection
Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?
APassword guessing attack
BDictionary attack
CMan-in-the-middle attack
DDenial-of-service attack
Which of the following statements best describes the difference between the role of a data owner and the role of a data custodian?
AThe custodian makes the initial information classification assignments and the operations manager implements the scheme.
BThe custodian implements the information classification scheme after the initial assignment by the operations manager.
CThe data custodian implements the information classification scheme after the initial assignment by the data owner.
DThe data owner implements the information classification scheme after the initial assignment by the custodian.
Which of the following cryptographic system services assures the receiver that the received message has not been altered?
AAuthentication
BConfidentiality
CNon-repudiation
DIntegrity
Which of the following statements about disaster recovery plan documentation are true?
Each correct answer represents a complete solution. Choose all that apply.
AThe documentation regarding a disaster recovery plan should be stored in backup tapes.
BThe documentation regarding a disaster recovery plan should be stored in floppy disks.
CThe disaster recovery plan documentation should be stored onsite only.
DThe disaster recovery plan documentation should be stored offsite only.
Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?
ARTA
BRPO
CRCO
DRTO
Which of the following roles is responsible for the review and risk analysis of all the contracts on regular basis?
AThe IT Service Continuity Manager
BThe Configuration Manager
CThe Supplier Manager
DThe Service Catalogue Manager
You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?
ARAID-5
BRAID-0
CRAID-1
DRAID-10
SIMULATION -
Fill in the blank with the appropriate number:
RAID-________ is a combination of RAID-1 and RAID-0.
Which of the following control measures are considered while creating a disaster recovery plan?
Each correct answer represents a part of the solution. Choose three.
ADetective measures
BSupportive measures
CCorrective measures
DPreventive measures
Which of the following are some of the parts of a project plan?
Each correct answer represents a complete solution. Choose all that apply.
ARisk identification
BTeam members list
CRisk analysis
DProject schedule
Which of the following statements are true about classless routing protocols?
Each correct answer represents a complete solution. Choose two.
AThe same subnet mask is used everywhere on the network.
BThey extend the IP addressing scheme.
CIGRP is a classless routing protocol.
DThey support VLSM and discontiguous networks.
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?
ASnooping
BPatent
CUtility model
DCopyright
Availability Management deals with the day-to-day availability of services. Which of the following takes over when a 'disaster' situation occurs?
ACapacity Management
BService Level Management
CService Continuity Management
DService Reporting
IT Service Continuity Management (ITSCM) is used to support the overall Business Continuity Management (BCM) in order to ensure that the required IT infrastructure and the IT service provision are recovered within an agreed business time scales. Which of the following are the benefits of implementing IT Service Continuity Management?
Each correct answer represents a complete solution. Choose all that apply.
AIt prioritizes the recovery of IT services by working with BCM and SLM.
BIt minimizes costs related with recovery plans using proper proactive planning and testing.
CIt confirms competence, impartiality, and performance capability of an organization that performs audits.
DIt minimizes disruption in IT services when it follows a major interruption or disaster.
You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?
AEradication
BIdentification
CContainment
DRecovery
Which of the following is established during the Business Impact Analysis by the owner of a process in accepted business continuity planning methodology?