Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Date: 0926/2018 Name Class b. False Indicate the sanswer choice that best comple

ID: 3755686 • Letter: D

Question

Date: 0926/2018 Name Class b. False Indicate the sanswer choice that best completes the stuwement or answers the qunestion 11. The CPMT conducts the BIA in three stages. Which of the following is NOT one of those stages? a. Determine mission/business processes and recovery criticality b. Identify recovery priorities for system resources c. Identify resource requirements d. All of these are BIA stages 12. Asite provides only radimentary services and facilities c. hot d. cold 13. Which of the following acts is a collection of statutes that regulate the interception of wire, electronic, and oral a. Electronic Communications Privacy Act b. Financial Services Modernization Ac c. Sarbanes-Oxley Act d. Economic Espionage Act 14. Microsoft acknowledged that if you type a res:/l URL (a Microsoft-devised type of URL) which is longer than charactèrs in Internet Explorer 4.0, the browser will crash. a. 64 c. 256 b. 128 d. 512 15. As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus a. false alarms b polymorphisms c. hoaxes a. USA PATRIOT Actb. Sarbanes-Oxley Act c. Gramm-Leach-Bliley Act d. Economic Espionage Act a. ESSPs b. EISPs c. ISSPsd. SysSPs d. urban legends defines stiffer penalties for prosecution of terrorist crimes 16. The 17 often function as standards or procedures to be used when configuring or maintaining systems 18. Acts of enter premises or systems they have not been authorized to enter. can lead to unauthorized real or virtual actions that enable information gatherers to a. bypass btheft c. trespass d. security 19. Theis the individual primarily responsible for the assessment, management, and implementation of information security in the organization. a. ISOb. CIO C. CISO d. 20. The intervention. of 1999 provides guidance on the use of encryption and provides protection from government a. Prepper Act b. Economic Espionage Act Copynight Cengage Leaming Powered by Cognero Page 2

Explanation / Answer

11.Ans-:d.) All of these are BIA stages

.explaination-: The CPMT conducts the BIA in three stages: Determine mission/business processes and recovery criticality; identify recovery priorities for system resources; and identify resource requirements.

12.Ans-:d.)cold site

as A cold site provides only rudimentary services and facilities such as a room with heating ,air-conditioning this type of site provide no computer hardware or user workstations.

13.Ans-:a.Electronic Communications Privacy Act of 1986 is a collection of statues that regulate the interception of wire ,electronic and oral communications.

15.Ans-:c.)hoaxes,, As frustating as viruses and worms are perhaps more time and money spend on resolving virus hoaxes people can disrupt harmony and can waste time when they send group of e-mail warning of supposedly dangerous virus that don't exist.

16.ANs-:a,)USA patriotic Act of 2001  defines stiffer penalties for prosecution of terrorist crimes .

17.Ans-:d.)SysSPs, often function as standards or procedures to be used when configuring or maintaining systems

18.Ans-:c.)tresspass

acts of tresspass can lead to unauthorised real or virtual actions that enable information gatherers to enter systems or premises they have not been authorise to enter

19.Ans-:c).CISO

CISO is the individual primarily responsibility for the assessment,management and implementation of information security in organisation.

20.ANs-:Encryption Act of 1999

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote