Security awareness training is MOST effective against which type of threat?
Security awareness training is MOST effective against which type of threat?A . Command injectionB . Denial of serviceC . Social engineeringD . Social injectionView AnswerAnswer: C Explanation: Security awareness training is MOST effective against social engineering threats. This is because social engineering is a type of attack that exploits human...
Which of the following is the BEST indication of mature third-party vendor risk management for an organization?
Which of the following is the BEST indication of mature third-party vendor risk management for an organization?A . The third party's security program Mows the organization s security program.B . The organization maintains vendor security assessment checklists.C . The third party maintains annual assessments of control effectiveness.D . The organization's...
The GREATEST advantage of using a common vulnerability scoring system is that it helps with:
The GREATEST advantage of using a common vulnerability scoring system is that it helps with:A . risk aggregation.B . risk prioritization.C . risk elimination.D . risk quantificationView AnswerAnswer: B Explanation: The GREATEST advantage of using a common vulnerability scoring system is that it helps with risk prioritization. This is because...
Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?
Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?A . It is difficult to know the applicable regulatory requirements when data is located on another country.B . Providers may be reluctant to share technical delays on the extent of...
Which of the following is the MOST important step to determine the risks posed to an organization by social media?
Which of the following is the MOST important step to determine the risks posed to an organization by social media?A . Review costs related to the organization's social media outages.B . Review cybersecurity insurance requirements for the organization s social media.C . Review the disaster recovery strategy for the organization's...