Which of the following intellectual Property components is focused on maintaining brand recognition?

Which of the following intellectual Property components is focused on maintaining brand recognition?A . TrademarkB . PatentC . Research LogsD . CopyrightView AnswerAnswer: A

June 22, 2021 No Comments READ MORE +

Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?

Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?A . Audit and LegalB . Budget and ComplianceC . Human Resources and BudgetD . Legal and Human ResourcesView AnswerAnswer: A

June 22, 2021 No Comments READ MORE +

Who is responsible for securing networks during a security incident?

Who is responsible for securing networks during a security incident?A . Chief Information Security Officer (CISO)B . Security Operations Center (SOC . Disaster Recovery (DR) managerD . Incident Response Team (IRT)View AnswerAnswer: D

June 22, 2021 No Comments READ MORE +

The establishment of a formal risk management framework and system authorization program is essential.

The establishment of a formal risk management framework and system authorization program is essential. The LAST step of the system authorization process is:A . Contacting the Internet Service Provider for an IP scopeB . Getting authority to operate the system from executive managementC . Changing the default passwordsD . Conducting...

June 22, 2021 No Comments READ MORE +

What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?

What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?A . Determine appetiteB . Evaluate risk avoidance criteriaC . Perform a risk assessmentD . Mitigate riskView AnswerAnswer: D

June 22, 2021 No Comments READ MORE +

From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?

You have recently drafted a revised information security policy. From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?A . Chief Information Security OfficerB . Chief Executive OfficerC . Chief Information OfficerD . Chief Legal CounselView AnswerAnswer: B

June 22, 2021 No Comments READ MORE +

When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?

When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?A . An independent Governance, Risk and Compliance organizationB . Alignment of security goals with business goalsC . Compliance with local privacy regulationsD . Support from Legal and...

June 22, 2021 No Comments READ MORE +

The single most important consideration to make when developing your security program, policies, and processes is:

The single most important consideration to make when developing your security program, policies, and processes is:A . Budgeting for unforeseen data compromisesB . Streamlining for efficiencyC . Alignment with the businessD . Establishing your authority as the Security ExecutiveView AnswerAnswer: C

June 21, 2021 No Comments READ MORE +

Which of the following most commonly falls within the scope of an information security governance steering committee?

Which of the following most commonly falls within the scope of an information security governance steering committee?A . Approving access to critical financial systemsB . Developing content for security awareness programsC . Interviewing candidates for information security specialist positionsD . Vetting information security policiesView AnswerAnswer: D

June 21, 2021 No Comments READ MORE +

Which of the following is a MAJOR consideration when an organization retains sensitive customer data and uses this data to better target the organization’s products and services?

Which of the following is a MAJOR consideration when an organization retains sensitive customer data and uses this data to better target the organization’s products and services?A . Strong authentication technologiesB . Financial reporting regulationsC . Credit card compliance and regulationsD . Local privacy lawsView AnswerAnswer: D

June 21, 2021 No Comments READ MORE +