Regulatory requirements typically force organizations to implement

Regulatory requirements typically force organizations to implementA . Mandatory controls B. Discretionary controls C. Optional controls D. Financial controlsView AnswerAnswer: A

November 6, 2022 No Comments READ MORE +

Which of the following represents the HIGHEST negative impact resulting from an ineffective security governance program?

Which of the following represents the HIGHEST negative impact resulting from an ineffective security governance program?A . Reduction of budget B. Decreased security awareness C. Improper use of information resources D. Fines for regulatory non-complianceView AnswerAnswer: D

November 5, 2022 No Comments READ MORE +

Which of the following is used to establish and maintain a framework to provide assurance that information security strategies are aligned with organizational objectives?

Which of the following is used to establish and maintain a framework to provide assurance that information security strategies are aligned with organizational objectives?A . Awareness B. Compliance C. Governance D. ManagementView AnswerAnswer: C

November 5, 2022 No Comments READ MORE +

Which of the following has the GREATEST impact on the implementation of an information security governance model?

Which of the following has the GREATEST impact on the implementation of an information security governance model?A . Organizational budget B. Distance between physical locations C. Number of employees D. Complexity of organizational structureView AnswerAnswer: D

November 5, 2022 No Comments READ MORE +

An organization's Information Security Policy is of MOST importance because

An organization's Information Security Policy is of MOST importance becauseA . it communicates management’s commitment to protecting information resources B. it is formally acknowledged by all employees and vendors C. it defines a process to meet compliance requirements D. it establishes a framework to protect confidential informationView AnswerAnswer: A

November 5, 2022 No Comments READ MORE +

One of the MAIN goals of a Business Continuity Plan is to

One of the MAIN goals of a Business Continuity Plan is toA . Ensure all infrastructure and applications are available in the event of a disaster B. Allow all technical first-responders to understand their roles in the event of a disaster C. Provide step by step plans to recover business...

November 5, 2022 No Comments READ MORE +

What role should the CISO play in properly scoping a PCI environment?

What role should the CISO play in properly scoping a PCI environment?A . Validate the business units’ suggestions as to what should be included in the scoping process B. Work with a Qualified Security Assessor (QSA) to determine the scope of the PCI environment C. Ensure internal scope validation is...

November 5, 2022 No Comments READ MORE +

Which of the following is the MOST likely reason for the policy shortcomings?

A security professional has been promoted to be the CISO of an organization. The first task is to create a security policy for this organization. The CISO creates and publishes the security policy. This policy however, is ignored and not enforced consistently. Which of the following is the MOST likely...

November 4, 2022 No Comments READ MORE +

Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?

Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?A . Audit and Legal B. Budget and Compliance C. Human Resources and Budget D. Legal and Human ResourcesView AnswerAnswer: A

November 4, 2022 No Comments READ MORE +

What is the definition of Risk in Information Security?

What is the definition of Risk in Information Security?A . Risk = Probability x Impact B. Risk = Threat x Probability C. Risk = Financial Impact x Probability D. Risk = Impact x ThreatView AnswerAnswer: A

November 4, 2022 No Comments READ MORE +