Which of the following terms describes the annually expected financial loss to an organization from a threat?
A. Annualized Rate of Occurrence (ARO)
B. Single Loss Expectancy (SLE)
C. Annualized Loss Expectancy (ALE)
D. Exposure factor (EF)
正解:C
質問 2:
Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?
A. FAU
B. Galleta
C. Asterisk logger
D. Access Pass View
正解:D
質問 3:
Which of the following statements best describes the difference between the role of a data owner and the role of a data custodian?
A. The data custodian implements the information classification scheme after the initial assignment by the data owner.
B. The data owner implements the information classification scheme after the initial assignment by the custodian.
C. The custodian implements the information classification scheme after the initial assignment by the operations manager.
D. The custodian makes the initial information classification assignments and the operations manager implements the scheme.
正解:A
質問 4:
Which of the following phases involves getting the final senior management signoff and creating enterprise-wide awareness of the plan?
A. Scope and Plan Initiation
B. Business Impact Assessment
C. Plan Approval and Implementation
D. Business Continuity Plan Development
正解:C
質問 5:
John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.
A. Dictionary attack
B. Hybrid attack
C. Rule based attack
D. Brute Force attack
正解:A,B,D
質問 6:
Which of the following statements are true about security risks?
Each correct answer represents a complete solution. Choose three.
A. They can be removed completely by taking proper actions.
B. They can be mitigated by reviewing and taking responsible actions based on possible risks.
C. They can be analyzed and measured by the risk analysis process.
D. They are considered an indicator of threats coupled with vulnerability.
正解:B,C,D
質問 7:
Which of the following stages of the business continuity planning life cycle focuses on the execution and testing of the individual solution designs developed?
A. Analysis stage
B. Implementation stage
C. Testing and acceptance stage
D. Solution design stage
正解:B
質問 8:
Which of the following documents is necessary to continue the business in the event of disaster or emergency?
A. Recourse record
B. Fiscal value
C. Vital record
D. Legal value
正解:C
Wakasa -
試験対策の312-76問題集として実用的です!短時間で勉強になりました。そして試験にも無事合格です!