Sample questions

Q1. Memory and address protection is a control used to ensure:

  1. Controlled access to physical facility
  2. controlled access to the memory and address locations by the application
  3. Controlled access to hardware
  4. Vulnerability assessment

Q2. A tabletop exercise is also known as:

  1. Simulation test
  2. Parallel test
  3. Structured walkthrough
  4. Full test

Q3. An artificial intelligence-based system that tries to reproduce the performance of one or more human experts is called:

  1. Hybrid system
  2. Expert system
  3. Computer networks
  4. Database system

Q4. The timeframe within which systems should be recovered (indicated in terms of hours/days) is known as:

  1. Recover Point Objective
  2. Recovery Data Objective
  3. Recovery Test Objective
  4. Recovery Time Objective

Q5. Software development is part of the:

  1. Database development life cycle
  2. Document model
  3. System development life cycle
  4. Disaster recovery process

Q6. A batch process to dump the data at periodical intervals to a remote backup system is called:

  1. Journaling
  2. Data vaulting
  3. Database shadowing
  4. Tape backup

Q7. A type of Risk Assessment exercise that tries to assess qualitative and quantitative impacts on the business due to a disruptive event is called:

  1. Group risk assessment
  2. Business Plan Analysis
  3. Business Impact Analysis
  4. Business process analysis

Q8. Incident management is:

  1. Establishing systematic and procedural way of managing incidents
  2. Operations security controls
  3. Memory protection
  4. Documenting Business Continuity Plans

Q9. Which one of the following is not a backup process?

Sample questions

Q10. Which of the following are Class C combustible materials?

Sample questions
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.226.185.196