Topic 2: Volume B
You are calculating the Annualized Loss Expectancy (ALE) using the following formula: ALE=AV * EF * ARO What information does the AV (Asset Value) convey?
A. It represents how many times per year a specific threat occurs.
B. It represents the percentage of loss that an asset experiences if an anticipated threat occurs
C. It is expected loss for an asset due to a risk over a one year period.
D. It represents the total cost of an asset, including the purchase price, recurring maintenance, expenses, and all other costs.
Which of the following are the examples of technical controls? Each correct answer represents a complete solution. (Choose three).
A. Auditing
B. Network architecture
C. System access
D. Data backups
Which of the following authentication methods prevents unauthorized execution of code on remote systems?
A. TACACS
B. S-RPC
C. RADIUS
D. CHAP
Which of the following life cycle modeling activities establishes service relationships and message exchange paths?
A. Service-oriented logical design modeling
B. Service-oriented conceptual architecture modeling
C. Service-oriented discovery and analysis modeling
D. Service-oriented business integration modeling
An organization is seeking to implement a hot site and wants to maintain a live database server at the backup site. Which of the following solutions will be the best for the organization?
A. Electronic vaulting
B. Remote journaling
C. Remote mirroring
D. Transaction logging
Page 17 out of 48 Pages |
Previous |