Upgrade to remove ads Show Only ₩37,125/year
Terms in this set (21)Joe is authoring a document that explains to system administrators one way that they might comply with the organization's requirement to encrypt all laptops. B.Guideline Explanation: Which one of the following statements is not true about compensating controls under their PCI DSS? A. Controls used to fulfill one PCI DSS requirement may be used to compensate for the absence of a control needed to meet another requirement What law creates cybersecurity obligations for healthcare providers and others in the health industry? A.HIPPA Explanation: Which one of the following is not one of the five core security functions definite by the NIST CyberSecurity framework? B. Contain Explanation: What is standard applies to information security management controls? B.27001 Explanation: Which one of the following
documents must normally be approved by the CEO or similarly high-level executive? D.Policy Explanation: What SABSA architecture layer corresponds to the designers view of security
architecture? C.Logical security architecture Explanation: What law governs the financial records of publicly traded companies? B.SOX Explanation: What TOGAF domain
provides the organizations approach to storing and managing information assets? C.Data architecture Explanation: Which one of the following would not normally would be found in
a organizations information security policy? B.Requirement to use AES-256 encryption Explanation: Security polices do not normally contain prescriptive technical guidance, such as a requirement to use a specific encryption algorithm. Darren is helping the Human Resources department create a new policy for background checks on new hires. D.Administrative Explanation: Which one of the following control models describes the five core activities associated with IT service management as a service strategy, service design, service transition, service operation, and continual service improvement? D.ITIL Explanation; What compliance obligation applies to merchants and service providers who work with credit card
information? D.PCI DSS Explanation: Which one of the following policies
would typically answer questions about when an organization should destroy records? D.Data retention policy Explanation: While
studying an organizations risk management process under the NIST Cybersecurity Framework, Rob determines that the organization adapts its cybersecurity practices based on lessons learned and predictive indicators derived from previous and current cybersecurity actitivies. D.Tier 4 Explanation: Which one of the following security policy framework components does not contain mandatory guidance for individuals in the organization? D.Guideline Explanation: Tina is creating a set of firewall rules designed to block denial-of-service attacks from entering her organizations network. A.Logical controls Explanation: Allan is developing a document that lists the acceptable mechanisms for securely obtaining remote administrative access to servers in his organization. B. Standard Explanation: Which
one of the following is not a common use of the NIST Cybersecurity Framework? d. Create specific technology requirements for an organization Shelly is writing a document that describes the steps that incident response teams will follow upon first notice of a potential incident. D.Procedure Explanation: WHat is standard applies to information seucirty management controls? ...
Sets with similar termsITEC370 Test 280 terms DJFATWILL CS 332 Chptr 456 terms akilubalt Cumulative Final Secure Policy53 terms nick_saveleski CSIS 340 - Bob Tucker - Exam 280 terms soccergoal757PLUS Sets found in the same folder
Chapter 10 Defense in Depth Security Architecture19 terms Keegzzz5 Chapter 7 Performing Forensic Analysis20 terms Keegzzz5 Chapter 8 Recovery and Post-Incident Response20 terms Keegzzz5 Jason Dion's CySA+ Practice Exam 160 terms Keegzzz5 Other sets by this creatorPentest+ Jason Dions Practice Questions18 terms Keegzzz5 Sybex Practice Exam Chapter 6 Practice Exam 251 terms Keegzzz5 Sybex Pratice Questions Domain 5 Chapter 585 terms Keegzzz5 Sybex Practice Exam Book Chapter 4216 terms Keegzzz5 Verified questions
ENGINEERING A child's balloon is a sphere 1 ft. in diameter. The balloon is filled with helium $\left(\rho=0.014 \mathrm{lbm} / \mathrm{ft}^{3}\right)$. The balloon material weighs 0.008 $\mathrm{lb} / \mathrm{ft}^{2}$ of surface area. If the child releases the balloon, how high will it rise in the Standard Atmosphere. (Neglect expansion of the balloon as it rises.) Verified answer
ENGINEERING A 60 W bulb is on for 10 h. a. What is the energy used in wattseconds? b. What is the energy dissipated in joules? c. What is the energy transferred in watthours? d. How many kilowatthours of energy were dissipated? e. At 12c/kWh, what was the total cost? Verified answer
ENGINEERING Consider the vertical rectangular wall of a water tank with a width of 5 m and a height of 8 m. The other side of the wall is open to the atmosphere. The resultant hydrostatic force on this wall is (a) 1570 kN (b) 2380 kN (c) 2505 kN (d) 1410 kN (e) 404 kN Verified answer ENGINEERING Consider the following reaction representing the combustion of propane: $\mathrm{C}_{3} \mathrm{H}_{8}+\mathrm{O}_{2} \rightarrow \mathrm{CO}_{2}+\mathrm{H}_{2} \mathrm{O}$ (a) Balance the equation. (b) How many moles of oxygen are required to burn 1 mol of propane? (c) How many grams of oxygen are required to burn 100 g of propane? (d) At standard temperature and pressure, what volume of oxygen would be required to burn 100 g of propane? If air is 21 percent oxygen, what volume of air at STP would be required? (e) At STP, what volume of $\mathrm{CO}_{2}$ would be produced when 100 g of propane are burned? Verified answer Other Quizlet setsreligion test 123456 i like nba2k15 terms jamesdanurd practical 3 lesson 986 terms melinda_tran7 CS241v260 terms succulent_pear History of Chiropractic - midterm30 terms shelton_elaina Related questionsQUESTION What is the primary function of a web browser? 15 answers QUESTION Mismatch repair requires the ability to distinguish between template and newly synthesized DNA strands. How can E. coli distinguish between these two strands? 15 answers QUESTION A nurse assistant has been asked to collect a clean clutch urine specimen from Mr. Jones , a non catheterized person with slight dementia , The NA should? 2 answers QUESTION Which is the best way to insure that students will lead a physically active lifestyle. 7 answers Which of the following best describes compensating controls?Which of the following BEST describes compensating controls? Partial control solution that is implemented when a control cannot fully meet a requirement.
Which of the following security policy framework components does not contain mandatory instructions for individuals in the organization?Which one of the following security policy framework components does not contain mandatory guidance for individuals in the organization? Explanation: Guidelines are the only element of the security policy framework that are optional.
Which of the following are the five functions of the NIST cybersecurity framework quizlet?The five concurrent and continuous Functions that serve as a foundation of the NIST CSF and include: Identify, Protect, Detect, Respond, and Recover.
|