Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In which contingency plan testing strategy do individuals follow each and every IR/DR/BC procedure, including the interruption of service, restoration of data from backups, and

In which contingency plan testing strategy do individuals follow each and every IR/DR/BC procedure, including the interruption of service, restoration of data from backups, and notification of appropriate individuals? a. Full-interruption b. Desk check c. Simulation d. Structured walk-through

Which act requires organizations that retain health care information to use InfoSec mechanisms to protect this information, as well as policies and procedures to maintain them?

a.

Sarbanes-Oxley

b.

Gramm-Leach-Bliley

c.

HIPAA

d.

ECPA

Strategies to limit losses before and during a realized adverse event is covered by which of the following plans in the mitigation control approach?

a.

damage control plan

b.

disaster recovery plan

c.

incident response plan

d.

business continuity plan

The InfoSec measurement development process recommended by NIST is is divided into two major activities. Which of the following is one of them?

a.

Compare organizational practices against organizations of similar characteristics

b.

Regularly monitor and test networks

c.

Maintain a vulnerability management program

d.

Identification and definition of the current InfoSec program

The risk control strategy that attempts to reduce the impact of the loss caused by a realized incident, disaster, or attack through effective contingency planning and preparation is known as the mitigation risk control strategy. ____________

True

False

Application of training and education is a common method of which risk control strategy?

a.

acceptance

b.

mitigation

c.

transferal

d.

defense

"Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individuals shoulder or viewing the information from a distance. _________________________

True

False

Which of the following is NOT a CISSP concentration?

a.

ISSAP

b.

ISSTP

c.

ISSMP

d.

ISSEP

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Medical Image Databases

Authors: Stephen T.C. Wong

1st Edition

1461375398, 978-1461375395

More Books

Students also viewed these Databases questions