(TCO 7) Security operations generally does not provide controls for _____. (Poin
ID: 3846048 • Letter: #
Question
(TCO 7) Security operations generally does not provide controls for _____. (Points : 5) personnel securityresource protection
backup and recovery of locally stored workstation data
privileged entity controls
virus scanning Question 5.5. (TCO 7) Security operations does NOT use controls for _____. (Points : 5) threats
vulnerabilities
intrusions
communications devices
management decision making Question 6.6. (TCO 8) A disaster recovery plan should always attempt to restore the system to _____. (Points : 5) full operating capability
degraded operating capability
the known good state
a stable state
an alternate operating capability Question 7.7. (TCO 8) A business impact analysis identifies _____. (Points : 5) risks to the business
quantifies risks
risks to the business if critical services are discontinued
priorities of restoring critical services
All of the above Question 8.8. (TCO 9) What is the U.S. government classification label that means that unauthorized disclosure may seriously damage national security? (Points : 5) CONFIDENTIAL
SECRET
TOP SECRET
NOFORN
RESTRICTED Question 9.9. (TCO 9) Access controls control access of _____ to _____. (Points : 5) people, applications
subjects, objects
roles, applications
roles, objects
Any of the above Question 10.10. (TCO 9) The _____ is the person who has the overall responsibility for information within a particular system. (Points : 5) network administrator
system administrator
site manager
information owner
data security officer (TCO 7) Security operations generally does not provide controls for _____. (Points : 5) personnel security
resource protection
backup and recovery of locally stored workstation data
privileged entity controls
virus scanning
Explanation / Answer
backup and recovery of locally stored workstation data
Security operations does NOT use controls for _____
management decision making
a stable state
All of the above
TOP SECRET
subjects, objects
information owner
- (TCO 7) Security operations generally does not provide controls for .........
backup and recovery of locally stored workstation data
-
Security operations does NOT use controls for _____
management decision making
- Question 6.6. (TCO 8) A disaster recovery plan should always attempt to restore the system to _____
a stable state
- Question 7.7. (TCO 8) A business impact analysis identifies _____
All of the above
- Question 8.8. (TCO 9) What is the U.S. government classification label that means that unauthorized disclosure may seriously damage national security?
TOP SECRET
- Access controls control access of _____ to _____
subjects, objects
- Question 10.10. (TCO 9) The _____ is the person who has the overall responsibility for information within a particular system
information owner
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.