94%(115)108 out of 115 people found this document helpful
This preview shows page 1 - 4 out of 44 pages.
CMIT 425Question 1 (1 point) Question 1 Saved_________________ pertains to acting responsibly and doing the right thing. It is a legal term that defines the standards of performance that can be expected, either by contract or by implication, in the execution of a particular task.Due careDue diligenceInvestigationInspectionQuestion 2 (1 point) Question 2 SavedHow often should a business continuity plan be tested?At least every five yearsOnly when the infrastructure or environment changesWhich of the following security controls is intended to fix components or systems after an incident has occurred?DetectiveCompensatingWhat is RAID 5?StripingMirroringDuring an emergency, if one can't get to the organization's data, which security objective has been compromised?
Which access control method provides access based on the job a user performs within an organization?Discretionary Access Control (DAC)Lattice ModelWhat type of security classification level requires higher than normal assurance of accuracy and completeness?PublicPrivateTop SecretWhich of the following security control processes is in place to ensure that all changes are approved, documented, tested, and properly implemented?Question 8 options:Change controlPassword controlSystem controlBusiness continuityQuestion 9 (1 point) Question 9 SavedIn one-time pad encryption, the cipher is deemed unbreakable only if all of the following are true about the implementation process EXCEPT:The pad must be used only one timeThe pad must be as long as the messageThe pad must be securely distributed and protected at its destinationThe pad must be made up of truly non-random valuesQuestion 10 (1 point) Question 10 SavedWhich one of the following technologies can be used to preserve data availability?Encryption for data in transit (IPSec, SSL, PPTP, SSH)Access control (physical and technical)Clustering