
PART2
Authored by Ayomide Oluwaga
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the event of a disaster, what should be the PRIMARY objective?
Apply disaster communication
Protect the production database
Guarantee the safety of people
Guarantee the continuity of critical systems
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security professional should report violations of a company's security policy to:
The ISC Ethics Committee
Company management
National authorities
A court of law
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which department in a company is NOT regularly involved in a DRP?
Executives
IT
Public Relations
Financial
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is included in an SLA document?
A plan to prepare the organization for the continuation of critical business functions
A plan to keep business operations going while recovering from a significant disruption
Instructions to detect, respond to, and limit the consequences of a cyber-attack
Instructions on data ownership and destruction
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the most important difference between MAC and DAC?
In MAC, security administrators set the roles for the users; in DAC, roles are set at the object owner’s discretion
In MAC, security administrators assign access permissions; in DAC, security administrators set user roles
In MAC, security administrators assign access permissions; in DAC, access permissions are set at the object owner’s discretion
In MAC, access permissions are set at the object owner’s discretion; in DAC, it is up to security administrators to assign access permissions
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Requiring a specific user role to access resources is an example of:
MAC
ABAC
RBAC
DAC
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of document outlines the procedures ensuring that vital company systems keep running during business disrupting events?
Business Impact Plan
Business Impact Analysis
Disaster Recovery Plan
Business Continuity Plan
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?