Join the discussion
Question 1/34
In business continuity (BC) terms, what is the name of the individual responsible for recording all pertinent information associated with a BC exercise or real plan invocation?
Correct Answer: A
Add Comments
- Other Question (34q)
- Q1. In business continuity (BC) terms, what is the name of the individual responsible for reco...
- Q2. Which types of organisations are likely to be the target of DDoS attacks?...
- Q3. When seeking third party digital forensics services, what two attributes should one seek w...
- Q4. James is working with a software programme that completely obfuscates the entire source co...
- Q5. In a security governance framework, which of the following publications would be at the HI...
- Q6. Why should a loading bay NEVER be used as a staff entrance?...
- Q7. Which cryptographic protocol preceded Transport Layer Security (TLS)?...
- Q8. When considering the disposal of confidential data, equipment and storage devices, what so...
- Q9. Which of the following testing methodologies TYPICALLY involves code analysis in an offlin...
- Q10. Why have MOST European countries developed specific legislation that permits police and se...
- Q11. Which three of the following characteristics form the AAA Triad in Information Security? 1...
- Q12. What form of attack against an employee has the MOST impact on their compliance with the o...
- Q13. In terms of security culture, what needs to be carried out as an integral part of security...
- Q14. Ensuring the correctness of data inputted to a system is an example of which facet of info...
- Q15. Which standard deals with the implementation of business continuity?...
- Q16. In software engineering, what does 'Security by Design" mean?...
- Q17. Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on i...
- Q18. What form of risk assessment is MOST LIKELY to provide objective support for a security Re...
- Q19. When calculating the risk associated with a vulnerability being exploited, how is this ris...
- Q20. According to ISO/IEC 27000, which of the following is the definition of a vulnerability?...
- Q21. When preserving a crime scene for digital evidence, what actions SHOULD a first responder ...
- Q22. When a digital forensics investigator is conducting art investigation and handling the ori...
- Q23. Which of the following is often the final stage in the information management lifecycle?...
- Q24. Which security framework impacts on organisations that accept credit cards, process credit...
- Q25. Which of the following is NOT a valid statement to include in an organisation's security p...
- Q26. When establishing objectives for physical security environments, which of the following fu...
- Q27. What Is the root cause as to why SMS messages are open to attackers and abuse?...
- Q28. You are undertaking a qualitative risk assessment of a likely security threat to an inform...
- Q29. A system administrator has created the following "array" as an access control for an organ...
- Q30. How does the use of a "single sign-on" access control policy improve the security for an o...
- Q31. Which of the following types of organisation could be considered the MOST at risk from the...
- Q32. Which of the following uses are NOT usual ways that attackers have of leveraging botnets?...
- Q33. Which term is used to describe the set of processes that analyses code to ensure defined c...
- Q34. Which term describes the acknowledgement and acceptance of ownership of actions, decisions...
