You work as a Security Administrator for uCertify Inc. You have installed ten separate applications for your employees to work. All the applications require users to log in before working on them; however, this takes a lot of time. Therefore, you decide to use SSO to resolve this issue. Which of the following are the other benefits of Single Sign-On (SSO)?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are process elements for remote diagnostics?
Each correct answer represents a complete solution. Choose all that apply.
In which of the following mechanisms does an authority, within limitations, specify what objects can be accessed by a subject?
You work as a Security Administrator for uCertify Inc. You observe that an employee is spreading personal data of your organization. Which of the following standards of information security deals with the employees handling personal data in an organization?
The usage of pre-numbered forms for initiating a transaction is an example of which of the following types of control?
Which of the following is NOT a type of FMEA?
John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.
Sam uses Monte Carlo simulation to quantitatively assess cost and schedule risks of his project during planning processes. During risk monitoring and control, Sam repeats the technique, but it leads to different results. Which of the following cannot be the reason for the difference in results?
Which of the following statements is true about Return On Investment?
Which of the following tools can be used to detect steganography?