Question
Question 1 Which one of the following is an example of a direct cost that might result from a business disruption? A) Damaged reputation B)
Question 1
Which one of the following is an example of a direct cost that might result from a business disruption?
A) | Damaged reputation |
B) | Lost market share |
C) | Facility repair |
|
|
Question 2
Dawn is selecting an alternative processing facility for her organization's primary data center. She would like to have a facility that balances cost and switchover time. What would be the best option in this situation?
A) | Hot site |
B) | Warm site |
C) | Primary site |
|
|
Question 3
Holly would like to run an annual major disaster recovery test that is as thorough and realistic as possible. She also wants to ensure that there is no disruption of activity at the primary site. What option is best in this scenario?:
A) | Checklist test |
B) | Full interruption test |
C) | Parallel test |
|
|
Question 4
A hospital is planning to introduce a new point-of-sale system in the cafeteria that will handle credit card transactions. Which one of the following governs the privacy of information handled by those point-of-sale terminals?
|
|
A) | Payment Card Industry Data Security Standard (PCI DSS) |
B) | Federal Information Security Management Act (FISMA) |
C) | Federal Financial Institutions Examination Council (FFIEC) |
Question 5
Which one of the following is an example of a logical access control?
|
|
A) | Password |
B) | Access card |
C) | Fence |
Question 6
During which phase of the access control process does the system answer the question, "What can the requestor access?"
A) | Identification |
|
|
B) | Authorization |
C) | Accountability |
Question 7
Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of access control is Ed concerned about?
A) | Identification |
B) | Authentication |
|
|
C) | Accountability |
Which one of the following is an example of two-factor authentication? Question 8
A) | Smart card and personal identification number (PIN) |
B) | Personal identification number (PIN) and password |
C) | Password and security questions |
|
|
Question 9
Which of the following is NOT a benefit of cloud computing to organizations?
Question 9 options:
A) | On-demand provisioning |
B) | Improved disaster recovery |
|
|
C) | Lower dependence on outside vendors |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started