HOTSPOT
Which Web Services Security (WS-Security) specification maintains a single authenticated identity across multiple dissimilar environments? Click on the correct specification in the image below.
Hot Area:
HOTSPOT
Identify the component that MOST likely lacks digital accountability related to information access. Click on the correct device in the image below.
Hot Area:
DRAG DROP
Place the following information classification steps in sequential order.
Select and Place:
DRAG DROP
Order the below steps to create an effective vulnerability management process.
Select and Place:
DRAG DROP
Given the various means to protect physical and logical assets, match the access management area to the technology.
Select and Place:
DRAG DROP
During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is
fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.
What is the best approach for the CISO?
Below are the common phases to creating a Business Continuity/Disaster Recovery (BC/DR) plan. Drag the remaining BC\DR phases to the appropriate corresponding location.
Select and Place:
DRAG DROP
Match the access control type to the example of the control type. Drag each access control type net to its corresponding example.
Select and Place:
DRAG DROP
Match the types of e-authentication tokens to their description.
Drag each e-authentication token on the left to its corresponding description on the right.
Select and Place:
DRAG DROP
Drag the following Security Engineering terms on the left to the BEST definition on the right.
Select and Place:
DRAG DROP
Match the functional roles in an external audit to their responsibilities. Drag each role on the left to its corresponding responsibility on the right.
Select and Place: