Topic 7: . Security Operations
A continuous information security monitoring program can BEST reduce risk through which of the following?
A.
Collecting security events and correlating them to identify anomalies
B.
Facilitating system-wide visibility into the activities of critical user accounts
C.
Encompassing people, process, and technology
D.
Logging both scheduled and unscheduled system changes
Facilitating system-wide visibility into the activities of critical user accounts
An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?
A.
Absence of a Business Intelligence (BI) solution
B.
Inadequate cost modeling
C.
Improper deployment of the Service-Oriented Architecture (SOA)
D.
Insufficient Service Level Agreement (SLA)
Inadequate cost modeling
An organization is found lacking the ability to properly establish performance indicators for
its Web hosting solution during an audit. What would be the MOST probable cause?
A.
Absence of a Business Intelligence (BI) solution
B.
Inadequate cost modeling
C.
proper deployment of the Service-Oriented Architecture (SOA)
D.
Insufficient Service Level Agreement (SLA)
Insufficient Service Level Agreement (SLA)
Which of the following is a PRIMARY advantage of using a third-party identity service?
A.
Consolidation of multiple providers
B.
Directory synchronization
C.
Web based logon
D.
Automated account management
Directory synchronization
What is the MOST important step during forensic analysis when trying to learn the purpose
of an unknown application?
A.
Disable all unnecessary services
B.
Ensure chain of custody
C.
Prepare another backup of the system
D.
Isolate the system from the network
Isolate the system from the network
Page 10 out of 298 Pages |
Previous |