You work as a Security Administrator for uCertify Inc. You have installed ten separate applications for your employees to work. All the applications require users to log in before working on them; however, this takes a lot of time. Therefore, you decide to use SSO to resolve this issue. Which of the following
are the other benefits of Single Sign-On (SSO)?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following paragraphs of the Turnbull Guidance provide clear description of the principles of a risk treatment plan?
Each correct answer represents a complete solution. Choose all that apply.
Mark works as a Security Administrator for uCertify Inc. Somehow Mark comes to know that an employee is keeping illegal software on his workstation. After investigating, Mark finds that this is indeed true. Therefore, Mark decides to file a law suit against the organization, as it is against organization's norms to store illegal information. Now, the organization decides to call the police and suspend Mark from work till further internal inquiries. Which of the following practices has been implemented in this scenario?
Sam works as the Chief Information Security Officer for Blue Well Inc. There are a number of teams for the security purposes. Which of the following are the types of teams of which Sam can be a part of?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Security Professional for uCertify Inc. You are working on a Disaster Recovery Plan (DRP). Which of the following are basic functions of DRP?
Each correct answer represents a complete solution. Choose all that apply.
You are responsible for a Microsoft based network. Your servers are all clustered. Which of the following are the likely reasons for the clustering? Each correct answer represents a complete solution. Choose two.
You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following is an intangible asset?
How can you calculate the Annualized Loss Expectancy (ALE) that may occur due to a threat?
Which of the following are the variables on which the structure of Service Level Agreement depends?
Each correct answer represents a complete solution. Choose all that apply.
In which of the following sections of the Computer Misuse Act 1990 are amendments made by Part 5 of the Police and Justice Act 2006?
Each correct answer represents a complete solution. Choose all that apply.