Skillsets
Certifications
Contact
Sign Up
Login
Home
Skillsets
Certifications
Contact
Help
FAQ
Security Operations
SKILLSET
No description available
Vulnerability Management
Computer Forensics Fundamentals
Disaster Recovery Fundamentals
Business Impact Analysis
Incident Response Fundamentals
Security Operations Fundamentals
Secure Change Management
Related Questions
Under trusted recovery, which of the following takes place in response to a trusted computing base (TCB) failure:
Following on from ITIL fundamentals theory, an engineer turns up one evening at your Data Centre to hot-swap some failed drives in a server. You check your local Change/Incident/Request management application and indeed find an approved Change for the stated piece of work. It all looks good, however, even though the engineer does possess an active site access card - she does not have signed Site Access paperwork. Should you let her into the Data Centre? You do understand the work is of a critical nature.
Operations security is about configuration, performance, fault tolerance, security, and accounting and verification management to ensure proper standards of operations and compliance requirements are met
The threshold for specific errors and mistakes allowed, is known as the __________ level
Which of the following are âcontinuousâ processes; select all that apply.
Operations Security has an effect on which of the following?
Software licensing can mean ensuring systems do not have unauthorized software installed
A detective control would seek to mitigate the impact of a loss event by implementing data recovery procedures.
Which security criteria generally entails system architecture, system integrity, covert channel analysis, trusted facility management, and trusted recovery?
What should a service catalogue contain?
×