Question 41
Which of the following acts of information security governance affects the financial institutions?
Question 42
Which of the following functions is performed by change control?
Question 43
Which of the following system security policies is used to address specific issues of concern to the organization?
Question 44
Seth wants to get an approximate picture of the likelihood of the risks that were identified by his organization.
After getting a high-level understanding of their probability, he could dedicate his resources to risk mitigation according to the priorities since he was a bit under-staffed. He was told that out of the identified risks, the occurrence of an earthquake was highly unlikely owing to the geography of their location. Furthermore, he learned that the chances of a fire breaking out in his building were high and his facility also faced a risk of physical intrusion but that was partly under control owing to the physical guards. What kind of risk assessment is Seth essentially conducting?
After getting a high-level understanding of their probability, he could dedicate his resources to risk mitigation according to the priorities since he was a bit under-staffed. He was told that out of the identified risks, the occurrence of an earthquake was highly unlikely owing to the geography of their location. Furthermore, he learned that the chances of a fire breaking out in his building were high and his facility also faced a risk of physical intrusion but that was partly under control owing to the physical guards. What kind of risk assessment is Seth essentially conducting?
Question 45
Fill in the blank:
An ___________________ (AS) is a group of networks under a single administration and with single routing policies.
An ___________________ (AS) is a group of networks under a single administration and with single routing policies.
