Which algorithm is a current specification for the encryption of electronic data established by NIST?
Answer : B
In business continuity, what is a battle box?
Answer : A
What term is used to describe the testing of a continuity plan through a written scenario being used as the basis for discussion and simulation?
Answer : C
When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always be taken into consideration?
Answer : A
What physical security control would be used to broadcast false emanations to mask the presence of true electromagentic emanations from genuine computing equipment?
Answer : B
Which of the following cloud delivery models is NOT intrinsically "trusted" in terms of security by clients using the service?
Answer : D
What Is the PRIMARY reason for organisations obtaining outsourced managed security services?
Answer : A