(TCO 1) Protection-in-depth is a _____.
safety requirement
safety mannequin
safety technique
safety coverage
safety management
Query 2. Query
:
(TCO 1) What are the widespread results of controls?
Prevention, detection, and response
Administration, expertise, and bodily
Detection, accounting, and entry management
Identification, audit, and entry management
Confidentiality, integrity, and availability
Query three. Query
:
(TCO 1) Data safety managers shouldn’t be
motivated by _____.
IN concern for the well-being of
society
governmental regulation
concern, uncertainty, and doubt
promotion potential
readiness
:
Query four. Query
:
(TCO 1) The distinctive safety points and concerns of
each system make it essential to grasp all the following, besides _____.
safety requirements
safety abilities of builders
and software program safety configurations
knowledge sensitivity
IN the enterprise of the group
Query 5. Query
:
(TCO 2) Which of the next domains shouldn’t be a part of the
IISSCC CBK?
Structure
Mission Administration
Ethics
Regulation
Operations Safety
Query 6. Query
:
(TCO 2) A safety occasion that causes injury known as _____.
IN a compromise
a violation
an incident
a mishap
a transgression
Query 7. Query
:
(TCO 2) What’s the enemy of safety?
Trade
Overseas nations
Rivals
Complexity
Folks
Query eight. Query
:
(TCO 2) What are the results of safety controls?
Confidentiality, integrity, and availability
Administrative, bodily, and operational
Detection, prevention, and response
Administration, operational, and technical
Not one of the above
Query 9. Query
:
(TCO 1) Insurance policies and procedures are also known as
_____.
fashions
a mandatory evil
pointers
documentation
Query 10. Query
:
(TCO 2) There are _____ domains of the Frequent Physique of
Data.
12
9
11
10