1. A security analyst is using the SCinformation system = [(confidentiality, impact), (integrity, impact), (availability, impact)]formula while performing risk analysis. What will this formula be used for?
A) to calculate SLE
B) to calculate quantitative risk
C) to calculate ALE
D) to calculate the aggregate CIA score
2. What services allow for changes to an operating system to be detected by an authorized party?
A) attestation
B) bonding
C) verification
D) sealing
3. What port number does HTTPS use?
A) 69
B) 443
C) 80
D) 23
4. Which of the following is an example of an incident?
A) account lockout for a single user account
B) an invalid user account - s login attempt
C) several invalid password attempts for multiple users
D) a user attempting to access a folder to which he does nothave access
5. An organization has a research server farm with a value of $12,000. The exposure factor for a complete power failure is 10%.The annualized rate of occurrence that this will occur is 5%. What is the ALE for this event?
A) $1,200
B) $600
C) $60
D) $12,000