Which of the following security models dictates that subjects can only access objects through applications?
You work as a project manager for SoftTech Inc. A threat with a dollar value of $150,000 is expected to happen in your project and the frequency of threat occurrence per year is 0.001. What will be the annualized loss expectancy in your project?
You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. One of the employees of your organization asks you the purpose of the security awareness, training and education program. What will be your answer?
Which of the following are the examples of administrative controls? Each correct answer represents a complete solution. Choose all that apply.
Which of the following are the goals of risk management? Each correct answer represents a complete solution. Choose three.
Which of the following analysis provides a foundation for measuring investment of time, money and human resources required to achieve a particular outcome?
Which of the following is the default port for Simple Network Management Protocol (SNMP)?
What are the purposes of audit records on an information system? Each correct answer represents a complete solution. Choose two.
Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known, but by which a business can obtain an economic advantage over its competitors?