1.
Which of the following cryptographic system services proves a user's identity?
2.
The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?
3.
Which methodology is a method to analyze the involved tasks in completing a given project, especially the time needed to complete each task, and identifying the minimum time needed to complete the total project?
4.
Which of the following RAID levels provides fault tolerance?
5.
You are the project manager for a construction project. The project involves casting of a column in a very narrow space. Because of the lack of space, casting is highly dangerous. High technical skill will be required for casting that column. You decide to hire a local expert team for casting that column. Which of the following types of risk response are you following?
6.
Which of the following options is an activity of observing the content that appears on a computer monitor or watching what a user is typing?
7.
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?
8.
Which of the following elements of BCP process includes the areas of plan implementation, plan testing, and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?
9.
Which of the following should the administrator ensure during the test of a disaster recovery plan?
10.
Which of the following governance bodies provides management, operational, and technical controls to satisfy the security requirements?