Information Security and Assurance - C725, Exam Review Questions and answers, Verified 2024
Which two passwords are the weakest? Pa$$w0Rd%^78 Love@$MySon80 C@1Il@VEm1 Password1234 - -Love@$MySon80 Password1234 Which groups typically report to the chief security officer (CSO)? - -Security engineering and operations What is the formula for computing single loss expectancy - -SLE = AV x EF [Single Loss Expectancy = Asset Value x Exposure Factor] A violation of the "separation of duties" principle arises when the security systems software is accessed by which of the following individuals? - -Systems programmer An example of the separation of duties of a computer operation is when a company has one environment for the software developers, another for quality assurance testing, and a third for production, or the environment that end users access, to perform their duties. As software is deemed ready, it is promoted from environment to environment by systems and security administration personnel, not the programmer. This separation of duties prevents a programmer from launching into production software that can perpetrate fraud or cause damage to production data or resources. What is the formula for computing annualized loss expectancy? - -ALE=SLE x ARO Single Loss Expectancy x Annual Rate of OccurrenceWhat is the first thing you should do when a disaster Strikes? - -Ensure the people are safe
Written for
Document information
- Uploaded on
- October 18, 2023
- Number of pages
- 5
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
information security and assurance c725 exam re
Document also available in package deal