FEDVTE CYBER SECURITY OVERVIEW FOR MANAGERS QUESTIONS WITH CORRECT ANSWERS
An insurance plan is what type of mitigation strategy? CORRECT ANSWER Transfer Risk Which of the following is not a reason why a backdoor may exist? CORRECT ANSWER Attempts to interfere with the ability of a provider to keep services available What is the act of hiding messages in existing data called? CORRECT ANSWER Steganography Which of the following addresses risk from a mission and business process perspective? CORRECT ANSWER Tier 2 Which of the following provides procedures and guidance to sustain an organization's essential functions at an alternate site for up to 30 days? CORRECT ANSWER Continuity of Operations Plan Which of the following is the correct order of the security life cycle? CORRECT ANSWER Categorize Select Implement Assess Authorize Monitor Which of the following serves as an effective communications channel and provides an ongoing basis for ensuring the alignment of the security program with business objectives? CORRECT ANSWER Steering committee Which of the following includes personnel and systems to perform health monitoring and management? CORRECT ANSWER NOC
Written for
- Institution
- FEDVTE CYBER SECURITY
- Course
- FEDVTE CYBER SECURITY
Document information
- Uploaded on
- December 31, 2022
- Number of pages
- 2
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
an insurance plan is what type of mitigation strategy correct answer transfer risk which of the following is not a reason why a backdoor may exist correct answer attempts to interfere with the abil
Also available in package deal