- (Topic 1)
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
Correct Answer:
A
- (Topic 2)
Which of the following is the best approach to conflict resolution?
Correct Answer:
B
- (Topic 1)
In which of the following access control models can a user not grant permissions to other
users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?
Correct Answer:
D
- (Topic 2)
Which of the following refers to the process of verifying the identity of a person, network host, or system process?
Correct Answer:
B
- (Topic 1)
You work as an executive manager for Mariotx.Inc. You entered into a business contract with a firm called Helfixnet.Inc. You passed on the contract details to Helfixnet.Inc and also got an acceptance approval. You later find that Helfixnet.Inc is violating the rules of the contract and they claim that they had never entered into any contract with Mariotx.Inc when asked. Which of the following directives of Information Assurance can you apply to ensure prevention from such issues?
Correct Answer:
B