Physical assets defined in an organization's business impact analysis (BIA) could include which of the following?
Correct Answer:
D
🗳️
When assessing the audit capability of an application, which of the following activities is MOST important?
Correct Answer:
C
🗳️
An organization would like to implement an authorization mechanism that would simplify the assignment of various system access permissions for many users with similar job responsibilities. Which type of authorization mechanism would be the BEST choice for the organization to implement?
Correct Answer:
A
🗳️
What is the PRIMARY reason for criminal law being difficult to enforce when dealing with cybercrime?
Correct Answer:
A
🗳️
Wi-Fi Protected Access 2 (WPA2) provides users with a higher level of assurance that their data will remain protected by using which protocol?
Correct Answer:
A
🗳️
Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing system?
Correct Answer:
A
🗳️
What process facilitates the balance of operational and economic costs of protective measures with gains in mission capability?
Correct Answer:
D
🗳️
Clothing retailer employees are provisioned with user accounts that provide access to resources at partner businesses. All partner businesses use common identity and access management (IAM) protocols and differing technologies. Under the Extended Identity principle, what is the process flow between partner businesses to allow this IAM action?
Correct Answer:
B
🗳️
Which of the following statements BEST describes least privilege principle in a cloud environment?
Correct Answer:
D
🗳️
An organization has been collecting a large amount of redundant and unusable data and filling up the storage area network (SAN). Management has requested the identification of a solution that will address ongoing storage problems. Which is the BEST technical solution?
Correct Answer:
A
🗳️