Exam 7: Operations

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When should a crisis management center location be identified?

(Multiple Choice)
4.9/5
(33)

In Tracy's company, there has been a security breach. The company triaged the situation to determine its depth. What would be the next stage of an incident response procedure?

(Multiple Choice)
4.8/5
(37)

What is the most important element of a good Business Continuity Plan?

(Multiple Choice)
4.9/5
(43)

What is used to detect software faults?

(Multiple Choice)
5.0/5
(41)

When is a crisis normally declared "over"?

(Multiple Choice)
4.8/5
(41)

There are many problems when it comes to applying security to systems. What item below is a problem for security implementation?

(Multiple Choice)
4.8/5
(25)

Zebra Inc. owns two buildings within a 100 mile radius. This was a purposeful decision so that if a disaster were to strike, there would be a redundant site. What should be the minimum distance between Zebra Inc.'s two buildings for regional disasters?

(Multiple Choice)
4.9/5
(29)

Manual electronic backup solutions can be time-consuming, costly, and error-prone. However, there are several technologies that can serve as an alternative. What alternative focuses on the transmission of deltas and not the transmission of actual files?

(Multiple Choice)
4.8/5
(36)

When it comes to computer crimes, there are two main types of surveillance. Which type would include auditing events?

(Multiple Choice)
4.8/5
(38)

Newbie has recently been asked to join the Business Continuity Planning team. As his first assignment, he is tasked with creating a list of potential threats for the company and ranking them. What phase of the project is he working on?

(Multiple Choice)
4.8/5
(39)

There are many different types of computer crimes that can be committed with different methods. What computer crime is committed when the criminal commits small crimes to prevent the overall crime from being noticed?

(Multiple Choice)
4.8/5
(39)

What is the difference between a computer-assisted crime and a computer-targeted crime?

(Multiple Choice)
4.8/5
(39)

Which of the following are required to be a part of the Crisis Management Center? Select all that apply.

(Multiple Choice)
4.8/5
(27)

I have uploaded a virus that my antivirus program cannot find due to a false image being presented to it. What is on my computer?

(Multiple Choice)
4.7/5
(33)

When creating a business continuity plan, which of these decisions should be made first?

(Multiple Choice)
4.9/5
(44)

When you turned your computer on this morning, it crashed. You are not concerned because yesterday, you created a _______.

(Multiple Choice)
4.8/5
(43)

The FFF Corporation manufactures nuclear products. Bob, the senior manager feels the company should put into place a system that is designed to seek security breaches. What type of system does Bob want?

(Multiple Choice)
4.7/5
(41)

There are many different types of computer crimes that can be committed with different methods. What computer crime is committed when there is an alteration of data?

(Multiple Choice)
4.9/5
(32)

Bob's building just burned down, but his friend Ken owns a building four miles down the road. Ken's building has an empty floor, so he told Bob to come and use the empty floor until his building is fixed. Bob accepted, knowing he would do the same with his spare floor. What is this process called?

(Multiple Choice)
4.8/5
(38)

If a company faces a facility disruption that is equal to a catastrophe, they may have to find offsite facilities or rebuild the original building. If a company has to find an offsite facility, what would not be an option?

(Multiple Choice)
4.8/5
(39)
Showing 61 - 80 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)