Which of the following should be determined while defining risk management strategies?

Which of the following should be determined while defining risk management strategies?A . Organizational objectives and risk toleranceB . Enterprise disaster recovery plansC . Risk assessment criteriaD . IT architecture complexityView AnswerAnswer: A

September 2, 2019 No Comments READ MORE +

Which of the following intellectual Property components is focused on maintaining brand recognition?

Which of the following intellectual Property components is focused on maintaining brand recognition?A . TrademarkB . Research LogsC . CopyrightD . PatentView AnswerAnswer: A

September 1, 2019 No Comments READ MORE +

The framework that helps to define a minimum standard of protection that business stakeholders must attempt to achieve is referred to as a standard of:

The framework that helps to define a minimum standard of protection that business stakeholders must attempt to achieve is referred to as a standard of:A . Due CompromiseB . Due processC . Due CareD . Due ProtectionView AnswerAnswer: C

August 31, 2019 No Comments READ MORE +

Who must be informed of this incident?

A Security Operations Centre (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen and the database server was disconnected. Who must be informed of this incident?A . Internal auditB . The data ownerC . All executive staffD . Government...

August 30, 2019 No Comments READ MORE +

If your organization operates under a model of "assumption of breach", you should:

If your organization operates under a model of "assumption of breach", you should:A . Establish active firewall monitoring protocolsB . Purchase insurance for your compliance liabilityC . Focus your security efforts on high value assetsD . Protect all information resource assets equallyView AnswerAnswer: B

August 29, 2019 No Comments READ MORE +

Developing effective security controls is a balance between:

Developing effective security controls is a balance between:A . Technology and Vendor ManagementB . Operations and RegulationsC . Risk Management and OperationsD . Corporate Culture and Job ExpectationsView AnswerAnswer: C

August 29, 2019 No Comments READ MORE +

Which of the following is of MOST importance when security leaders of an organization are required to align security to influence the culture of an organization?

Which of the following is of MOST importance when security leaders of an organization are required to align security to influence the culture of an organization?A . Understand the business goals of the organizationB . Poses a strong technical backgroundC . Poses a strong auditing backgroundD . Understand all regulations...

August 27, 2019 No Comments READ MORE +

Which of the following is the MOST likely reason for the policy shortcomings?

A security professional has been promoted to be the CISO of an organization. The first task is to create a security policy for this organization. The CISO creates and publishes the security policy. This policy however, is ignored and not enforced consistently. Which of the following is the MOST likely...

August 25, 2019 No Comments READ MORE +

The PRIMARY objective for information security program development should be:

The PRIMARY objective for information security program development should be:A . Reducing the impact of the risk to the business.B . Establishing incident response programs.C . Establishing strategic alignment with business continuity requirements.D . Identifying and implementing the best security solutions.View AnswerAnswer: A

August 25, 2019 No Comments READ MORE +

You are updating the inventory worksheet for a local tree farm

SIMULATION Project 3 of 7: Tree Inventory Overview You are updating the inventory worksheet for a local tree farm. Hide rows 29 and 30.View AnswerAnswer: See explanation below.

August 24, 2019 No Comments READ MORE +