How is granular control of objects and resources implemented within a mandatory
access control environment?
Give this one a try later!
Need to know
The sensitivity adjustment on a biometric authentication device affects which of the
following?
Give this one a try later!
False acceptance rate & False rejection rate
,Why is account or identity proofing necessary?
Give this one a try later!
It verifies that only the authorized person is able to use a specific user
account.
How can a user avoid being seriously harmed by ransomware?
Give this one a try later!
Have an offline backup
Continuous monitoring is best defined by which of the following?
Give this one a try later!
A method of monitoring that is used to detect risk issues within an
organization
A disaster recovery plan (DRP) should focus on restoring mission critical services. Part
of the DRP is to ensure that recent data is available for processing once mission
critical services are restored. How is data loss addressed in DRP?
Give this one a try later!
, Through understanding the RPO
Which of the following is a poor choice for secure password management?
Give this one a try later!
Use the default password.
When an organization is unable to lose more than a few hours of data without
experiencing severe consequences, what means or method of backup is most
appropriate?
Give this one a try later!
Real-time backup
Which of the following types of access control is preferred for its ease of
administration when there are a large number of personnel with the same job in an
organization?
Give this one a try later!
Role-based Access Control
Which of the following offers the highest bandwidth and fiber-optic transmissions?
, Give this one a try later!
Multimode
What standards-based technology is supported on most platforms and is used as a
remote authentication service?
Give this one a try later!
RADIUS
The most redundancy and connection speed are offered by which of the following
network topologies?
Give this one a try later!
Mesh
What is the term used to describe a relationship between two entities where
resources from either side can be accessed by users from either side?
Give this one a try later!
Two-way trust
access control environment?
Give this one a try later!
Need to know
The sensitivity adjustment on a biometric authentication device affects which of the
following?
Give this one a try later!
False acceptance rate & False rejection rate
,Why is account or identity proofing necessary?
Give this one a try later!
It verifies that only the authorized person is able to use a specific user
account.
How can a user avoid being seriously harmed by ransomware?
Give this one a try later!
Have an offline backup
Continuous monitoring is best defined by which of the following?
Give this one a try later!
A method of monitoring that is used to detect risk issues within an
organization
A disaster recovery plan (DRP) should focus on restoring mission critical services. Part
of the DRP is to ensure that recent data is available for processing once mission
critical services are restored. How is data loss addressed in DRP?
Give this one a try later!
, Through understanding the RPO
Which of the following is a poor choice for secure password management?
Give this one a try later!
Use the default password.
When an organization is unable to lose more than a few hours of data without
experiencing severe consequences, what means or method of backup is most
appropriate?
Give this one a try later!
Real-time backup
Which of the following types of access control is preferred for its ease of
administration when there are a large number of personnel with the same job in an
organization?
Give this one a try later!
Role-based Access Control
Which of the following offers the highest bandwidth and fiber-optic transmissions?
, Give this one a try later!
Multimode
What standards-based technology is supported on most platforms and is used as a
remote authentication service?
Give this one a try later!
RADIUS
The most redundancy and connection speed are offered by which of the following
network topologies?
Give this one a try later!
Mesh
What is the term used to describe a relationship between two entities where
resources from either side can be accessed by users from either side?
Give this one a try later!
Two-way trust