Join the discussion
Question 1/83
Which of the following processes is involved in identifying, measuring, and controlling events?
Correct Answer: A
Add Comments
- Other Question (83q)
- Q1. Which of the following processes is involved in identifying, measuring, and controlling ev...
- Q2. Which of the following is a set of exclusive rights granted by a state to an inventor or h...
- Q3. Which of the following functions is performed by change control?...
- Q4. Which of the following types of storage requires some direct human action in order to make...
- Q5. Which of the following processes helps the business units to understand the impact of a di...
- Q6. Which of the following is prepared by the business and serves as a starting point for prod...
- Q7. You work as a Network administrator for Infonet Inc. The company has 135 Windows XP Profes...
- Q8. Allen works as a professional Computer Hacking Forensic Investigator. A project has been a...
- Q9. SIMULATION Fill in the blank with the appropriate phrase. __________________ is the proces...
- Q10. Which of the following types of control gives an instance of the audit log?...
- Q11. Which of the following disaster recovery tests includes the operations that shut down at t...
- Q12. Which of the following types of agreement can be a legally binding formal or informal "con...
- Q13. Which of the following procedures is designed to contain data, hardware, and software that...
- Q14. SIMULATION Fill in the blank: A ______ plan is a plan devised for a specific situation whe...
- Q15. Which of the following measurements of a disaster recovery plan are aimed at detecting unw...
- Q16. Which of the following global (Tier 1) policies de?nes what speci?cally the policy is goin...
- Q17. Which of the following security procedures is related to the SDLC's implementation?...
- Q18. Which of the following procedures is to reduce the risk to personnel, property, and other ...
- Q19. Which of the following acts of information security governance affects the financial insti...
- Q20. Organizations must assess the safety of their workplaces and consider the ability of a bus...
- Q21. Software Development Life Cycle (SDLC) is a logical process used by the programmers to dev...
- Q22. Drag and drop the appropriate team names in front of their respective responsibilities. (E...
- Q23. You work as a project manager for TYU project. You are planning for risk mitigation. You n...
- Q24. BS 7799 is an internationally recognized ISM standard that provides high level, conceptual...
- Q25. Fill the measurement of SFX form factor style power supply in the blank space. The SFX for...
- Q26. Which of the following modes of operation supports users with different clearances and dat...
- Q27. You work as the project manager for Bluewell Inc. Your project has several risks that will...
- Q28. An organization monitors the hard disks of its employees' computers from time to time. Whi...
- Q29. Organizations must assess the safety of their workplaces and consider the ability of a bus...
- Q30. Fill the measurement of SFX form factor style power supply in the blank space. The SFX for...
- Q31. SIMULATION Fill the appropriate power supply form factor in the blank space. _________ for...
- Q32. You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scena...
- Q33. Which of the following statements are true about an APW (Air Pressurized Water) extinguish...
- Q34. Which of the following cryptographic system services ensures that the information will not...
- Q35. Which of the following BCP teams handles financial arrangement, public relations, and medi...
- Q36. Which of the following defines the communication link between a Web server and Web applica...
- Q37. Which of the following cryptographic system services assures the receiver that the receive...
- Q38. Which of the following functions is performed by change control?...
- Q39. Which of the following steps has the goal to reduce the level of risk to the IT system and...
- Q40. Which of the following security procedures is NOT related to the SDLC's disposition?...
- Q41. Which of the following scripts is included as a part of disaster recovery plan to confirm ...
- Q42. Which of the following options is an intellectual property right to protect inventions?...
- Q43. Which of the following refers to the ability to ensure that the data is not modified or ta...
- Q44. Which of the following procedures is designed to enable security personnel to identify, mi...
- Q45. Which of the following BCP teams assesses the damage of the disaster in order to provide t...
- Q46. Which of the following system security policies is used to address specific issues of conc...
- Q47. Fill the appropriate power supply form factor in the blank space. _________form factor is ...
- Q48. Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network ...
- Q49. Which of the following individuals incorporates risk assessment in training programs for t...
- Q50. Which of the following processes involves taking measures to alter or improve the risk pos...
- Q51. Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) I...
- Q52. Which of the following tasks is prioritized the most by the information security strategy?...
- Q53. Drag and Drop Question Choose the steps involved in the general disaster recovery procedur...
- Q54. Which of the following phases is the first step towards creating a business continuity pla...
- Q55. Which of the following processes involves reducing the risk until it reaches a level accep...
- Q56. Which of the following is established during the Business Impact Analysis by the owner of ...
- Q57. Which of the following documents helps disaster recovery team members in getting the alter...
- Q58. Which of the following provides a means of predicting the outcome of the next software pro...
- Q59. In risk analysis, which of the following can be identified as a consequence of a disaster?...
- Q60. Which of the following sub-processes of IT Service Continuity Management is used to make s...
- Q61. Which of the following sources is the best for developing Recovery Time Objectives (RTO)?...
- Q62. Which of the following should the administrator ensure during the test of a disaster recov...
- Q63. You work as a senior project manager in SoftTech Inc. You are working on a software projec...
- Q64. Which of the following systems monitors the operating system detecting inappropriate activ...
- Q65. Which of the following BCP teams deals with the key decision making and guides recovery te...
- Q66. Drag and Drop Questions Disaster recovery plan consists of various tiers for identifying t...
- Q67. Which of the following ensures that the confidentiality, integrity, and availability of th...
- Q68. Which of the following documents is necessary to continue the business in the event of dis...
- Q69. You work as an Incident handling manager for Orangesect Inc. You detect a virus attack inc...
- Q70. IT Service Continuity Management (ITSCM) is used to support the overall Business Continuit...
- Q71. Which of the following disaster recovery tests includes the operations that shut down at t...
- Q72. Which of the following functions is performed by change control?...
- Q73. Which of the following processes is required for effective business continuity and disaste...
- Q74. Which of the following TCB techniques involves viewing system components at a high level a...
- Q75. Which of the following roles is responsible for the review and risk analysis of all the co...
- Q76. Which of the following is a category of an automated Incident detection process?...
- Q77. Allen works as a professional Computer Hacking Forensic Investigator. A project has been a...
- Q78. Which of the following is a duplicate of the original site of an organization, with fully ...
- Q79. Which of the following workforces works to handle the incidents in an enterprise?...
- Q80. You are working as a Project Manager in your organization. You are nearing the final stage...
- Q81. In which of the following managing styles does the manager supervise subordinates very clo...
- Q82. IT Service Continuity Management (ITSCM) is used to support the overall Business Continuit...
- Q83. Which of the following statements about disaster recovery plan documentation are true? Eac...
