Which security framework impacts on organisations that accept credit cards, process credit card transactions, store relevant data or transmitcredit card data?
Which security framework impacts on organisations that accept credit cards, process credit card transactions, store relevant data or transmitcredit card data?A . PCI DSC . TOGAE . ENISA NIG . Sarbanes-OxieyView AnswerAnswer: A Explanation: https://digitalguardian.com/blog/what-pci-compliance
Which of the following is NOT considered to be a form of computer misuse?
Which of the following is NOT considered to be a form of computer misuse?A . Illegal retention of personal data.B . Illegal interception of information.C . Illegal access to computer systems.D . Downloading of pirated software.View AnswerAnswer: A
Which term describes the acknowledgement and acceptance of ownership of actions, decisions, policies and deliverables?
Which term describes the acknowledgement and acceptance of ownership of actions, decisions, policies and deliverables?A . Accountability.B . Responsibility.C . Credibility.D . Confidentiality.View AnswerAnswer: A Explanation: https://hr.nd.edu/assets/17442/behavior_model_4_ratings_3_.pdf
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?A . Red Team Training.B . Blue Team Training.C . Black Hat Training.D . Awareness Training.View AnswerAnswer: C
Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD)within the Information Securitysphere?
Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD)within the Information Securitysphere?A . Professional qualification bodies demand CPC . Information Security changes constantly and at speed.D . IT certifications require CPD and Security needs to remain credible.E . CPD is a prerequisite of any...