The Software Configuration Management (SCM) process defines the need to trace changes, and the ability to verify that the final delivered software has all of the
planned enhancements that are supposed to be included in the release. What are the procedures that must be defined for each software project to ensure that a
sound SCM process is implemented? Each correct answer represents a complete solution. Choose all that apply.
At which of the following levels of robustness in DRM must the security functions be immune to widely available tools and specialized tools and resistant to professional tools?
Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?
Which of the following scanning techniques helps to ensure that the standard software configuration is currently with the latest security patches and software, and helps to locate uncontrolled or unauthorized software?
Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000 domain-based network. Users report that they are unable to log on to the network. Mark finds that accounts are locked out due to multiple incorrect log on attempts. What is the most likely cause of the account lockouts?
System Authorization is the risk management process. System Authorization Plan (SAP) is a comprehensive and uniform approach to the System Authorization
Process. What are the different phases of System Authorization Plan? Each correct answer represents a part of the solution. Choose all that apply.
The Project Risk Management knowledge area focuses on which of the following processes? Each correct answer represents a complete solution. Choose all that
apply.