What is the BEST way to achieve on-going compliance monitoring in an organization?

What is the BEST way to achieve on-going compliance monitoring in an organization?A . Only check compliance right before the auditors are scheduled to arrive onsite. B. Outsource compliance to a 3rd party vendor and let them manage the program. C. Have Compliance and Information Security partner to correct issues...

October 31, 2022 No Comments READ MORE +

What is the NEXT logical step in applying the controls in the organization?

An organization has defined a set of standard security controls. This organization has also defined the circumstances and conditions in which they must be applied. What is the NEXT logical step in applying the controls in the organization?A . Determine the risk tolerance B. Perform an asset classification C. Create...

October 31, 2022 No Comments READ MORE +

What would be the BEST approach to minimize scan data output while retaining a realistic view of system vulnerability?

A security officer wants to implement a vulnerability scanning program. The officer is uncertain of the state of vulnerability resiliency within the organization’s large IT infrastructure. What would be the BEST approach to minimize scan data output while retaining a realistic view of system vulnerability?A . Scan a representative sample...

October 30, 2022 No Comments READ MORE +

What does this selection indicate?

An organization’s firewall technology needs replaced. A specific technology has been selected that is less costly than others and lacking in some important capabilities. The security officer has voiced concerns about sensitive data breaches but the decision is made to purchase. What does this selection indicate?A . A high threat...

October 30, 2022 No Comments READ MORE +

When deploying an Intrusion Prevention System (IPS) the BEST way to get maximum protection from the system is to deploy it

When deploying an Intrusion Prevention System (IPS) the BEST way to get maximum protection from the system is to deploy itA . In promiscuous mode and only detect malicious traffic. B. In-line and turn on blocking mode to stop malicious traffic. C. In promiscuous mode and block malicious traffic. D....

October 30, 2022 No Comments READ MORE +

What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?

What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?A . Determine appetite B. Evaluate risk avoidance criteria C. Perform a risk assessment D. Mitigate riskView AnswerAnswer: D

October 30, 2022 No Comments READ MORE +

Which is the BEST type of risk that defines this event?

As the Risk Manager of an organization, you are task with managing vendor risk assessments. During the assessment, you identified that the vendor is engaged with high profiled clients, and bad publicity can jeopardize your own brand. Which is the BEST type of risk that defines this event?A . Compliance...

October 30, 2022 No Comments READ MORE +

Which of the following intellectual Property components is focused on maintaining brand recognition?

Which of the following intellectual Property components is focused on maintaining brand recognition?A . Trademark B. Patent C. Research Logs D. CopyrightView AnswerAnswer: A

October 30, 2022 No Comments READ MORE +

When managing the security architecture for your company you must consider:

When managing the security architecture for your company you must consider:A . Security and IT Staff size B. Company Values C. Budget D. All of the aboveView AnswerAnswer: D

October 30, 2022 No Comments READ MORE +

You have a system with 2 identified risks. You determine the probability of one risk occurring is higher than the

You have a system with 2 identified risks. You determine the probability of one risk occurring is higher than theA . Controlled mitigation effort B. Risk impact comparison C. Relative likelihood of event D. Comparative threat analysisView AnswerAnswer: C

October 30, 2022 No Comments READ MORE +