Question
In which contingency plan testing strategy do individuals follow each and every IR/DR/BC procedure, including the interruption of service, restoration of data from backups, and
In which contingency plan testing strategy do individuals follow each and every IR/DR/BC procedure, including the interruption of service, restoration of data from backups, and notification of appropriate individuals? a. Full-interruption b. Desk check c. Simulation d. Structured walk-through
Which act requires organizations that retain health care information to use InfoSec mechanisms to protect this information, as well as policies and procedures to maintain them?
a. | Sarbanes-Oxley | |
b. | Gramm-Leach-Bliley | |
c. | HIPAA | |
d. | ECPA |
Strategies to limit losses before and during a realized adverse event is covered by which of the following plans in the mitigation control approach?
a. | damage control plan | |
b. | disaster recovery plan | |
c. | incident response plan | |
d. | business continuity plan |
The InfoSec measurement development process recommended by NIST is is divided into two major activities. Which of the following is one of them?
a. | Compare organizational practices against organizations of similar characteristics | |
b. | Regularly monitor and test networks | |
c. | Maintain a vulnerability management program | |
d. | Identification and definition of the current InfoSec program |
The risk control strategy that attempts to reduce the impact of the loss caused by a realized incident, disaster, or attack through effective contingency planning and preparation is known as the mitigation risk control strategy. ____________
True
False
Application of training and education is a common method of which risk control strategy?
a. | acceptance | |
b. | mitigation | |
c. | transferal | |
d. | defense |
"Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individuals shoulder or viewing the information from a distance. _________________________
True
False
Which of the following is NOT a CISSP concentration?
a. | ISSAP | |
b. | ISSTP | |
c. | ISSMP | |
d. | ISSEP |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started