Friday, May 29, 2015
CISSP Exam Preparation (Question 298)
(298) Which one of the following is not one of the outcomes of a
vulnerability analysis?
A. Quantative loss assessment
B. Qualitative loss assessment
C. Formal approval of BCP scope
and initiation document
D. Defining critical support
areas
Correct Answer: C
Explanation/Reference:
- Muhammad Idham Azhari
Friday, May 22, 2015
CISSP Exam Preparation (Question 297)
(297) Risk analysis is MOST useful when applied during which phase of
the system development process?
A. Project identification
B. Requirements definition
C. System construction
D. Implementation planning
Correct Answer: A
Explanation/Reference:
Reference: pg 684 Shon Harris: All-in-One CISSP
Certification
- Muhammad Idham Azhari
Friday, May 15, 2015
CISSP Exam Preparation (Question 296)
(296) Which of the following is not a compensating measure for access violations?
A. Backups
B. Business continuity planning
C. Insurance
D. Security awareness
Correct Answer: D
Explanation/Reference:
- Muhammad Idham Azhari
Friday, May 8, 2015
CISSP Exam Preparation (Question 295)
(295) Which of the following best explains why computerized information
systems frequently fail to meet the needs of users?
A. Inadequate quality assurance
(QA) tools
B. Constantly changing user needs
C. Inadequate user participation
in defining the system's requirements
D. Inadequate project management.
Correct Answer: C
Explanation/Reference:
- Muhammad Idham Azhari
Subscribe to:
Posts (Atom)