0 out of 0.5 points A written plan for how to handle major disasters or outages and recover mission-critical systems, applications, and data is the definition of: Selected Answer:
Business Continuity Plan (BCP)
Correct Answer:
Disaster Recovery Plan (DRP) • Question 2
0.5 out of 0.5 points What name is given to a software review that identifies bugs or errors in software? Selected Answer:
Vulnerability assessment
Correct Answer:
Vulnerability assessment • Question 3
0.5 out of 0.5 points What is meant by second-level authentication? Selected Answer:
A second authentication requirement for users to gain access to more sensitive applications and data.
Correct Answer:
A second authentication requirement for users to gain access to more sensitive applications and data. • Question 4
0.5 out of 0.5 points In the field of information security, which of the following defines how the term availability is applied? Selected Answer:
A mathematical formula that quantifies the amount of uptime for a system compared to the amount of downtime, and usually displayed as a ratio or percentage.
Correct Answer:
A mathematical formula that quantifies the amount of uptime for a system compared to the amount of downtime, and usually displayed as a ratio or percentage. • Question 5
0 out of 0.5 points In which domain of a typical IT infrastructure do service level agreements (SLAs) figure prominently? Selected Answer:
Remote Access
Correct Answer:
WAN
• Question 6
0.5 out of 0.5 points What is ciphertext? Selected Answer:
The opposite of cleartext. Data sent as ciphertext is not visible and not decipherable.
Correct Answer:
The opposite of cleartext. Data sent as ciphertext is not visible and not decipherable. • Question 7
0.5 out of 0.5 points What term refers to ensuring the latest software revisions,