Information Security and Assurance - C725, Exam Review Questions and answers, Verified 2024
Which two passwords are the weakest? Pa$$w0Rd%^78 Love@$MySon80 C@1Il@VEm1 Password1234 - -Love@$MySon80 Password1234 Which groups typically report to the chief security officer (CSO)? - -Security engineering and operations What is the formula for computing single loss expectancy - -SLE = AV x EF [Single Loss Expectancy = Asset Value x Exposure Factor] A violation of the "separation of duties" principle arises when the security systems software is accessed by which of the following individuals? - -Systems programmer An example of the separation of duties of a computer operation is when a company has one environment for the software developers, another for quality assurance testing, and a third for production, or the environment that end users access, to perform their duties. As software is deemed ready, it is promoted from environment to environment by systems and security administration personnel, not the programmer. This separation of duties prevents a programmer from launching into production software that can perpetrate fraud or cause damage to production data or resources. What is the formula for computing annualized loss expectancy? - -ALE=SLE x ARO Single Loss Expectancy x Annual Rate of OccurrenceWhat is the first thing you should do when a disaster Strikes? - -Ensure the people are safe
Escuela, estudio y materia
- Institución
- Western Governors University
- Grado
- Information Security and Assurance - C725
Información del documento
- Subido en
- 18 de octubre de 2023
- Número de páginas
- 5
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
information security and assurance c725 exam re
Documento también disponible en un lote