1.(TCO 6) The media control that includes locked doors, desks, file cabinets, or safes is physical access protection _____. (Points : 5) environmental protection

weepingwaterpickΑσφάλεια

23 Φεβ 2014 (πριν από 3 χρόνια και 1 μήνα)

403 εμφανίσεις

1.

(TCO 6) The media control that includes locked doors, desks, file cabinets, or safes is

physical
access protection

_____. (Points : 5) environmental protection



physical access protection



integrity verification



disposition



identification


Question 2. 2. (TCO 6) Which of the following is NOT a perimeter security control? (Points : 5)


Badge



Smart card



Lock



Lighting



Dog


Question 3. 3. (TCO 6) Physical security deals with all of the follo
wing except _____. (Points : 5)


buildings



logical systems



computer rooms



computer devices



fences


Question 4. 4. (TCO 7) Record retention processes _____. (Points : 5)


keep track of changes made by administrators



define how long records are retained



are needed for retirement of information assets



protect company resources



protect management from prosecution


Question 5. 5. (TCO 7) As a security operations rule, policy should be establishe
d stating that media
should _____. (Points : 5)


be sanitized and destroyed



be marked and controlled



be marked and handled properly



never be reused



be accounted for


Question 6. 6. (TCO 8) A disaster recovery plan should al
ways attempt to restore the system to _____.
(Points : 5)


full operating capability



degraded operating capability



the known good state



a stable state



an alternate operating capability


Question 7.

7. (TCO 8) A business impact analysis identifies _____. (Points : 5)


risks to the business



quantifies risks



risks to the business if critical services are discontinued



priorities of restoring critical services



All of the
above


Question 8. 8. (TCO 9) What is the U.S. government classification label that means that unauthorized
disclosure may seriously damage national security? (Points : 5)


CONFIDENTIAL



SECRET



TOP SECRET



NOFORN



RESTRICTED


Question 9. 9. (TCO 9) Access controls control access of _____ to _____. (Points : 5)


people, applications



subjects, objects



roles, applications



roles, objects



Any of the above


Question 10. 10. (TCO 9) The predominant str
ategy that is used to assure confidentiality is _____. (Points
: 5)


biometric authentication



discretionary access control



role
-
based access control



symmetric encryption



the principle of least privilege