Question: 1
Michael starts a new job and discovers that he has unnecessary access to a variety of systems. Which of the
following best describes the problem he has encountered?
Question: 2
Which of the following best describes an access control process that confirms the identity of the entity seeking
access to a logical or physical area?
Question: 3
When dealing with a risk management process, asset classification is important because it will impact the overall:
Question: 4
Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?
Question: 5
Your company has a ''no right to privacy'' notice on all logon screens for your information systems and users sign an Acceptable Use Policy informing them of this condition. A peer group member and friend comes to you and requests access to one of her employee's email account. What should you do? (choose the BEST answer):