Which of the following individuals is responsible for the final accreditation decision? A. Certification Agent B. User Representative C. Information System Owner D. Risk Executive
Which of the following relations correctly describes total risk? A. Total Risk = Threats x Vulnerability x Asset Value B. Total Risk = Viruses x Vulnerability x Asset Value C. Total Risk = Threats x Exploit x Asset Value D. Total Risk = Viruses x Exploit x Asset Value
Which of the following formulas was developed by FIPS 199 for categorization of an information system? A. SCinformation system = {(confidentiality, impact), (integrity, controls), (availability, risk)} B. SCinformation system = {(confidentiality, risk), (integrity, impact), (availability, controls)} C. SCinformation system = {(confidentiality, impact), (integrity, impact), (availability, impact)} D. SCinformation system = {(confidentiality, controls), (integrity, controls), (availability, controls )}
Which of the following recovery plans includes a monitoring process and triggers for initiating planned actions? A. Business continuity plan B. Contingency plan C. Continuity of Operations Plan D. Disaster recovery plan
In which of the following elements of security does the object retain its veracity and is intentionally modified by the authorized subjects? A. Integrity B. Nonrepudiation C. Availability D. Confidentiality
Correct Answer: A
Please disable your adblocker or whitelist this site!