Question 25

What is an IP address

Correct Answer:C

Question 26

Which is the first step in the risk management process

Correct Answer:C

Question 27

Can be considered to be a fingerprint of the file or message

Correct Answer:A

Question 28

A set of security controls or system settings used to ensure uniformity of configuration through the IT environment?

Correct Answer:C

Question 29

Who should participate in creating a BCP

Correct Answer:C

Question 30

Which type of fire suppression system is more friendly to electronics

Correct Answer:A

START CC EXAM