expenditures, so it calls upon the services of financial auditors. While financmight also involve IT auditors to examine the technology in place to gather Selected Answer:arbitrageCorrect Answer:integrated auditThere are many ways that people can be manipulated to disclose knowledgsomeone under the false pretense of being from the IT department. This is kSelected Answer:pretextingCorrect Answer:pretextingIt is recommended that systems administrators analyze logs in order to deteserve this goal, a ________________ can be used to assemble logs from platfoSelected Answer:log serverCorrect Answer:log serverA procure document should accompany every baseline document. Which ofprocedure document needs to be created to support the baseline documentSelected Answer:Because many configuration processes reuse every configuration.Correct Answer:Because many configuration processes reuse every configuration.___________________ is a term that denotes a user’s capability to authenticatedifferent applications and devices afterward.
Selected Answer:Single sign-onCorrect Answer:Single sign-onIn general, WAN-specific standards identify specific security requirements focontrols needed to secure the connection from the internal network to the Wvital for use of Web services provided by suppliers and external partnershipSelected Answer:WAN router security standard, Web services standardCorrect Answer:WAN router security standard, Web services standardWhich of the following has the responsibility of offering instruction on intrustheir accompanying uses for diminishing false alerts?Selected Answer:IDS and IPS architecture and management guidelinesCorrect Answer:IDS and IPS architecture and management guidelinesThe ______________________ denotes the application software and technologysystems that process information.Selected Answer:system/application domainCorrect Answer:system/application domainWhich of the following statements illustrates the importance of the LAN-to-WSelected
Answer:The WAN should never have a direct connection and inspected.Correct Answer:The WAN should never have a direct connection and inspected.Which of the following types of baseline documents is often created to serveSelected Answer:proxy server configuration standardCorrect Answer:virus scanner configuration standardsLAN security policies center on issues concerning connectivity; this includescontrol standards are _______________, which creates the schedules on LAN-aand ________________, which explains the change control management procethe networkSelected Answer:controls over media, controlled maintenance,Correct Answer:controlled maintenance, configuration changecontrolIn a business impact analysis (BIA), the phase of defining the business’s comfollowing is notone the objectives?Selected Answer:ascertain the service impact and the financialcomponentsCorrect Answer:institute recovery time frames for the componpriority onlyThe initial step in creating a business continuity and security response plan security responses in order to diminish losses.
Selected Answer:business impact analysisCorrect Answer:business impact analysisThe goal of conducting an incident analysis is to ascertain weakness. Becau