Which of the following access control models uses a predefined set of access privileges for an object of a system?
Correct Answer:
B
Which of the following is NOT considered an environmental threat source?
Correct Answer:
B
You are the project manager of the GHQ project for your company. You are working you??re your project team to prepare for the qualitative risk analysis process. Mary, a project team member, does not understand why you need to complete qualitative risks analysis. You explain to Mary that qualitative risks analysis helps you determine which risks needs additional analysis. There are also some other benefits that qualitative risks analysis can do for the project. Which one of the following is NOT an accomplishment of the qualitative risk analysis process?
Correct Answer:
A
You work as a project manager for TechSoft Inc. You are working with the project stakeholders onthe qualitative risk analysis process in your project. You have used all the tools to the qualitative risk analysis process in your project. Which of the following techniques is NOT used as a tool in qualitative risk analysis process?
Correct Answer:
A
Which of the following statements best describes the difference between the role of a data owner and the role of a data custodian?
Correct Answer:
B