Which of the following is not one of the three commonly used business continuity plan (BCP) teams?
Blog
What is the strongest secondary (supporting) protection laye…
What is the strongest secondary (supporting) protection layer for defending against malware attacks?
True or False? The maximum age of a password policy identifi…
True or False? The maximum age of a password policy identifies when the password must be changed.
Which of the following terms is best defined as a weakness?
Which of the following terms is best defined as a weakness?
Which of the following is not a common category of control i…
Which of the following is not a common category of control implementation?
True or False? Loss Before Countermeasure – Loss After Count…
True or False? Loss Before Countermeasure – Loss After Countermeasure = Countermeasure Value
True or False? Installing antivirus software is a primary pr…
True or False? Installing antivirus software is a primary protection implemented in the User Domain of a typical IT infrastructure.
What should you do if you discover that a security gap has n…
What should you do if you discover that a security gap has not been closed?
Your team is developing a business impact analysis (BIA). Yo…
Your team is developing a business impact analysis (BIA). You have identified the critical business functions (CBFs) and associated processes. What should you do next?
Which approach to firewall rules starts off by blocking all…
Which approach to firewall rules starts off by blocking all traffic and then adding rules to allow approved traffic?