57 Soal Last Exam FCNS
57 Soal Last Exam FCNS
57 Soal Last Exam FCNS
A. Virtualization
B. Cloud computing
C. Redundancy
D. Application control
A. Social proof
B. Authority
C. Intimidation
D. Scarcity
- Confidentiality
- Availability
- Integrity
- Authenticity
12. What is the common Risk Management Framework used by typical
IT organisations to mitigate the risk ?
- Val IT
- Cobit 5
- Sarbanes Oxley
- Lack of Failover
- Non Compliance
- IT Plans
- Supplemental
- Mandatory
- System
- Discretionary
16. As a part of Security Compliance, Companies are advised to
conduct Security Risk Assessment and Review on a regular Basis.
Which of the following is the MAIN reason for performing Risk
assessment on a continuous basis ?
17. From the context of Cyber Security Cost, Which among the
below are best suited as "Spilt Over Effect".
- Capital Investment
- Cost Benefit
- Hidden Cost
- Additional Cost
- Eavesdroping Act
- Patriot Act
- BIBA
- CHINESE FIREWALL
- BELL LA Padula
-Data Manager
- Data Administrator
- Data Owner
- Data Custodian
- User Name
- Types of Violation
- User Id
- Crytographic Mechanism
- Virtualization Technology
- Physical Location
- Load Balancing
- re-direction.
- enticement.
- cracking.
- alteration.
- Mobile Phone
- File Sharing
- all workplaces
- some workplaces
- Integrity
- Authenticity
- Availability
- Confidentiality
- Employee Education
- Conducting Impact Analysis
- Impact Analysis
- Forensic Investigation
- Penetration Testing
- Gap Analysis
- Insurance Purchase
- Outsourcing
- Total Avoidance
- Department Managers
- Vendors
- DLP
38. Making sure that the data is accessible when and where it is
needed is which of the following?
- Confidentiality
- Integrity
- Availability
- Accountability
- Manpower Feasibility
- Technology Feasbility
- Economic feasibility
- Practical Feasibility
42. Which of
the following is a policy that would force all
users to organize their areas as well as help reducing the risk
of possible data theft ?
- Clean Desk Policy
- Data Disposal
- Password Behaviours
- Data Handling
44. Downloading Pirated Blue Ray Movies from the torrent sites
are a direct violation of which Legal Clause ?
- Smart Card
- Single Sign On
- Warm Site
- Cold Site
- Hot Site
- Hybrid DRP
- PCI-DSS
- ISO 27001
- TIA942
- ISO 9001
- Discretionary
- Relational
- Administrative
- Mandatory
53. An organization finds that most help desk calls ate regarding
account lockout due to a variety of applications running on
different systems. Manager is looking for a solution to reduce
the number of account lockouts while improving security. Which of
the following is the BEST solution for this organization?
A. Provide secure tokenS
B. Create multiple application accounts for each user
C. Implement SSO
D. Utilize role-based access control. No