Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONsec4

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
sec4

Description:
CS698 sameh ali

Author:
AVATAR

Creation Date:
15/03/2021

Category:
Others

Number of questions: 50
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
The process of collecting- analyzing- and preserving computer-related evidence Computer forensics Evidence Software as a Service (SaaS) Platform as a Service (PaaS).
A physical object or documented information entered into a legal proceeding that proves an action occurred or identifies the intent of a perpetrator Computer forensics Evidence Software as a Service (SaaS) Platform as a Service (PaaS).
in which applications are provided for a fee but hosted on third-party systems and accessed over the Internet and the Web. Computer forensics Evidence Software as a Service (SaaS) Platform as a Service (PaaS).
in which development platforms are available to developers for a fee and are hosted by third parties Computer forensics Evidence Software as a Service (SaaS) Platform as a Service (PaaS).
which is informally known as Everything as a Service- provides hardware and operating systems resources to host whatever the organization wants to implement. Again- the service is hosted by a third party for a fee Infrastructure as a Service (IaaS) Disaster Recovery as a Service (DRaaS) Differential backup Full backup.
One of the newest options available as a specialized disaster recovery. Infrastructure as a Service (IaaS) Disaster Recovery as a Service (DRaaS) Differential backup Full backup.
The duplication of all files that have changed or been added since the last full backup Infrastructure as a Service (IaaS) Disaster Recovery as a Service (DRaaS) Differential backup Full backup.
The duplication of all files for an entire system- including all applications- operating systems components- and data. Infrastructure as a Service (IaaS) Disaster Recovery as a Service (DRaaS) Differential backup Full backup.
The duplication of only the files that have been modified since the previous incremental backup Incremental backup Disk duplexing Disk mirroring L1 Disk striping L0.
An approach to disk mirroring in which each drive has its own controller to provide additional redundancy. Incremental backup Disk duplexing Disk mirroring L1 Disk striping L0.
It is where the computer records all data to twin drives simultaneously- providing a backup if the primary drive fails Incremental backup Disk duplexing Disk mirroring L1 Disk striping L0.
L1- It is where one logical volume is created by storing data across several available hard drives in segments called stripes. Incremental backup Disk duplexing Disk mirroring L1 Disk striping L0.
A hard drive feature that allows individual drives to be replaced without powering down the entire system and without causing a fault during the replacement Hot swap Redundant array of independent disks (RAID) Server fault tolerance Cold site.
A system of drives that stores information across Multiple units to spread out data and minimize the impact of a single drive failure Hot swap Redundant array of independent disks (RAID) Server fault tolerance Cold site.
provided by mirroring entire servers to provide redundant capaA level of redundancy city for services Hot swap Redundant array of independent disks (RAID) Server fault tolerance Cold site.
A facility that provides only rudimentary services- with no computer hardware or peripherals. Hot swap Redundant array of independent disks (RAID) Server fault tolerance Cold site.
A backup strategy to store duplicate online transaction data along with duplicate databases at the remote site on a redundant server Database shadowing Hot site Warm site Bonus.
A fully configured computing facility that includes all services- communications linksand physical plant operations Database shadowing Hot site Warm site Bonus.
A facility that provides many of the same services and options as a hot site- but typically without installed and configured software applications. Database shadowing Hot site Warm site Bonus.
مفيش سؤال 170 علم هنا متعلمش .
The adoption and implementation of an innovative business model- methodtechnique- resource- or technology in order to outperform the competition competitive advantage risk assessment risk control risk identification.
A determination of the extent to which an organization’s information assets are exposed to risk competitive advantage risk assessment risk control risk identification.
The application of controls that reduce the risks to an organization’s information assets to an acceptable level. competitive advantage risk assessment risk control risk identification.
The recognition- enumeration- and documentation of risks to an organization’s information assets competitive advantage risk assessment risk control risk identification.
The process of identifying risk- assessing its relative magnitude- and taking steps to reduce it to an acceptable level. risk management residual risk In Asset Identification - People Procedures.
The risk to information assets that remains even after current controls have been applied risk management residual risk In Asset Identification - People Procedures.
Position name- number- or ID (avoid using people’s names and stick to identifying positions- roles- or functions)- supervisor- security clearance level- special skills risk management residual risk In Asset Identification - People Procedures.
Description- intended purpose- relationship to software- hardware- and networking elements- storage location for reference- storage location for update risk management residual risk In Asset Identification - People Procedures.
Classification- owner- creator- and manager- size of datastructure- data structure used (sequential or relational)- online or offline- location- backup procedures employed. Data Name IP address Media access control (MAC) address.
Make sure that the names you choose are meaningful to all the groups that use the information. You should adopt naming standards that do not convey information to potential system attackers. Data name IP address Media access control (MAC) address.
This can be a useful identifier for network devices and servers- but it does not usually apply to software. You can- however- use a relational database to track software instances on specific servers or networking devices Data name IP address Media access control (MAC) address.
They are sometimes called electronic serial numbers or hardware addresses Data Name IP address Media access control (MAC) address.
For hardware- you can develop a list of element types- such as servers- desktopsnetworking devices- or test equipment. For software elements- you may develop a list of types that includes operating systems- custom applications by type (accounting- HRor payroll- for example)- packaged applications- and specialty applications- such as firewall programs Element type Physical location Logical location Threats-vulnerabilitiesassets(TVA).
This information falls under asset inventory- which can be performed once the identification process is started. Element type Physical location Logical location Threats-vulnerabilitiesassets(TVA).
The logical location is most useful for networking devices and indicates the logical network where the device is connected. Element type Physical location Logical location Threats-vulnerabilitiesassets(TVA).
triples Apairing of an asset with a threat and an identification of vulnerabilities that exist between the two Element type Physical location Logical location Threats-vulnerabilitiesassets(TVA).
Likelihood ? Attack Success Probability Loss Frequency Loss Magnitude single loss expectancy (SLE) annualized loss expectancy (ALE).
Asset Value ? Probable Loss Loss Frequency Loss Magnitude single loss expectancy (SLE) annualized loss expectancy (ALE).
exposure factor (EF) * asset value (AV). Loss Frequency Loss Magnitude single loss expectancy (SLE) annualized loss expectancy (ALE).
single loss expectancy (SLE) * annualized rate of occurrence (ARO) Loss Frequency Loss Magnitude single loss expectancy (SLE) annualized loss expectancy (ALE).
The number of successful attacks that are expected to occur within a specified time period. attack success probability Likelihood loss frequency transference risk control strategy.
The probability that a specific vulnerability within an organization will be the target of an attack attack success probability Likelihood loss frequency transference risk control strategy.
The calculation of the likelihood of an attack coupled with the attack frequency to determine the expected number of losses within a specified time range attack success probability Likelihood loss frequency transference risk control strategy.
It attempts to shift risk to other assets- other processes- or other organizations attack success probability Likelihood loss frequency transference risk control strategy.
It indicates the organization is willing to accept the current level of risk. Acceptance termination risk control strategy access control access control list (ACL).
It eliminates all risk associated with an information asset by removing it from service or handling decision points. Acceptance termination risk control strategy access control access control list (ACL).
The selective method by which systems specify who may use a particular resource and how they may use it Acceptance termination risk control strategy access control access control list (ACL).
Specifications of authorization that govern the rights and privileges of users to a particular information asset Acceptance termination risk control strategy access control access control list (ACL).
An access control approach whereby the organization specifies the use of objects based on some attribute of the user or system. attribute-based access control (ABAC) capabilities table discretionary access controls (DACs) lattice-based access control (LBAC).
In a lattice-based access control- the row of attributes associated with a particular subject (such as a user). attribute-based access control (ABAC) capabilities table discretionary access controls (DACs) lattice-based access control (LBAC).
Report abuse Consent Terms of use