Which of the following is not one of the three commonly used business continuity plan (BCP) teams?
True or False? The business continuity plan (BCP) program ma…
True or False? The business continuity plan (BCP) program manager declares the notification and activation phase.
Which approach to firewall rules starts off by blocking all…
Which approach to firewall rules starts off by blocking all traffic and then adding rules to allow approved traffic?
True or False? The chain of custody log should include the t…
True or False? The chain of custody log should include the time, date, and name of the person who is receiving evidence.
You are reviewing historical data in an attempt to identify…
You are reviewing historical data in an attempt to identify potential threats to your business. What would not be helpful to you in this process?
True or False? FERPA applies to all education institutions a…
True or False? FERPA applies to all education institutions and agencies that receive funding under any program administered by the U.S. Department of Education.
True or False? Personnel who own a system or are responsible…
True or False? Personnel who own a system or are responsible for its security should perform vulnerability assessments on that system.
For the U.S. in 2023, which of the following is (or are) tru…
For the U.S. in 2023, which of the following is (or are) true?
Which type of attack threatens the availability of a system?
Which type of attack threatens the availability of a system?
True or False? Telecommuters are not key to a business conti…
True or False? Telecommuters are not key to a business continuity plan (BCP) because they work from remote locations. Therefore, any disruptions would not affect them.