لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed inhouse by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed. The table below indicates some of the personal in
A. Nothing at this stage as the Managing Director has made a decision
B. Determine if any Clean-Q competitors currently use LeadOps as a solution
C. Obtain a legal opinion from an external law firm on contracts management
D. Involve the Information Security team to understand in more detail the types of services and solutions LeadOps is proposing
عرض الإجابة
اجابة صحيحة: D
السؤال #2
What is the main benefit of using a private cloud?
A. The ability to use a backup system for personal files
B. The ability to outsource data support to a third party
C. The ability to restrict data access to employees and contractors
D. The ability to cut costs for storing, maintaining, and accessing data
عرض الإجابة
اجابة صحيحة: C
السؤال #3
In the realm of artificial intelligence, how has deep learning enabled greater implementation of machine learning?
A. By using hand-coded classifiers like edge detection filters so that a program can identify where an object starts and stops
B. By increasing the size of neural networks and running massive amounts of data through the network to train it
C. By using algorithmic approaches such as decision tree learning and inductive logic programming
D. By hand coding software routines with a specific set of instructions to accomplish a task
عرض الإجابة
اجابة صحيحة: B
السؤال #4
What distinguishes a "smart" device?
A. It can perform multiple data functions simultaneously
B. It is programmable by a user without specialized training
C. It can reapply access controls stored in its internal memory
D. It augments its intelligence with information from the internet
عرض الإجابة
اجابة صحيحة: D
السؤال #5
To comply with the Sarbanes-Oxley Act (SOX), public companies in the United States are required to annually report on the effectiveness of the auditing controls of their financial reporting systems. These controls must be implemented to prevent unauthorized use, disclosure, modification, and damage or loss of financial data. Why do these controls ensure both the privacy and security of data?
A. Modification of data is an aspect of privacy; unauthorized use, disclosure, and damage or loss of data are aspects of security
B. Unauthorized use of data is an aspect of privacy; disclosure, modification, and damage or loss of data are aspects of security
C. Disclosure of data is an aspect of privacy; unauthorized use, modification, and damage or loss of data are aspects of security
D. Damage or loss of data are aspects of privacy; disclosure, unauthorized use, and modification of data are aspects of privacy
عرض الإجابة
اجابة صحيحة: C
السؤال #6
SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed inhouse by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed. The table below indicates some of the personal in
A. What is LeadOps’ annual turnover?
B. How big is LeadOps’ employee base?
C. Where are LeadOps' operations and hosting services located?
D. Does LeadOps practice agile development and maintenance of their system?
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A sensitive biometrics authentication system is particularly susceptible to?
A. False positives
B. False negatives
C. Slow recognition speeds
D. Theft of finely individualized personal data
عرض الإجابة
اجابة صحيحة: B
السؤال #8
SCENARIO You have just been hired by Ancillary.com, a seller of accessories for everything under the sun, including waterproof stickers for pool floats and decorative bands and cases for sunglasses. The company sells cell phone cases, e-cigarette cases, wine spouts, hanging air fresheners for homes and automobiles, book ends, kitchen implements, visors and shields for computer screens, passport holders, gardening tools and lawn ornaments, and catalogs full of health and beauty products. The list seems endle
A. Server driven controls
B. Cloud computing
C. Data on demand
D. MAC filtering
عرض الإجابة
اجابة صحيحة: A
السؤال #9
SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed inhouse by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed. The table below indicates some of the personal in
A. Understanding LeadOps’ costing model
B. Establishing a relationship with the Managing Director of LeadOps
C. Recognizing the value of LeadOps’ website holding a verified security certificate
D. Obtaining knowledge of LeadOps' information handling practices and information security environment
عرض الإجابة
اجابة صحيحة: D
السؤال #10
How can a hacker gain control of a smartphone to perform remote audio and video surveillance?
A. By performing cross-site scripting
B. By installing a roving bug on the phone
C. By manipulating geographic information systems
D. By accessing a phone's global positioning system satellite signal
عرض الإجابة
اجابة صحيحة: B
السؤال #11
What is the main function of the Amnesic Incognito Live System or TAILS device?
A. It allows the user to run a self-contained computer from a USB device
B. It accesses systems with a credential that leaves no discernable tracks
C. It encrypts data stored on any computer on a network
D. It causes a system to suspend its security protocols
عرض الإجابة
اجابة صحيحة: A
السؤال #12
What is the best way to protect privacy on a geographic information system?
A. Limiting the data provided to the system
B. Using a wireless encryption protocol
C. Scrambling location information
D. Using a firewall
عرض الإجابة
اجابة صحيحة: A
السؤال #13
SCENARIO Clean-Q is a company that offers house-hold and office cleaning services. The company receives requests from consumers via their website and telephone, to book cleaning services. Based on the type and size of service, Clean-Q then contracts individuals that are registered on its resource database - currently managed inhouse by Clean-Q IT Support. Because of Clean-Q's business model, resources are contracted as needed instead of permanently employed. The table below indicates some of the personal in
A. A provision that holds LeadOps liable for a data breach involving Clean-Q's information
B. A provision prescribing technical and organizational controls that LeadOps must implement
C. A provision that requires LeadOps to notify Clean-Q of any suspected breaches of information that involves customer or resource information managed on behalf of Clean-Q
D. A provision that allows Clean-Q to conduct audits of LeadOps’ information processing and information security environment, at LeadOps’ cost and at any time that Clean-Q requires
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: