00:00

QUESTION 1

Which of the following is NOT considered to be a form of computer misuse?

Correct Answer: A

QUESTION 2

What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controlsprocedures during a critical emergency situation?

Correct Answer: C

QUESTION 3

Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?

Correct Answer: D
https://en.wikipedia.org/wiki/Defense_in_depth_(computing)

QUESTION 4

A system administrator has created the following "array" as an access control for an organisation. Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files. What type of access-control has just been created?

Correct Answer: C

QUESTION 5

When undertaking disaster recovery planning, which of the following would NEVER be considered a "natural" disaster?

Correct Answer: B