A method to transfer risk is to______________.
A method to transfer risk is to______________.A . Implement redundancyB . Move operations to another regionC . Alignment with business operationsD . Purchase breach insuranceView AnswerAnswer: D
What is the NEXT logical step in applying the controls in the organization?
An organization has defined a set of standard security controls. This organization has also defined the circumstances and conditions in which they must be applied. What is the NEXT logical step in applying the controls in the organization?A . Determine the risk toleranceB . Perform an asset classificationC . Analyze...
From an information security perspective, information that no longer supports the main purpose of the business should be:
From an information security perspective, information that no longer supports the main purpose of the business should be:A . protected under the information classification policyB . analyzed under the data ownership policyC . assessed by a business impact analysis.D . analyzed under the retention policy.View AnswerAnswer: D
Which should NOT be changed or disabled on a connection server?
Which should NOT be changed or disabled on a connection server?A . Diagnostic System HostB . Remote Procedure CallC . Security CenterD . WLAN AutoConfigView AnswerAnswer: D
How should you configure the query filter?
HOTSPOT Your network contains an Active Directory domain named contoso.com. You are deploying Microsoft Advanced Threat Analytics (ATA) to the domain. You install the ATA Gateway on a server named Server1. To assist in detecting Pass-the-Hash attacks, you plan to configure ATA Gateway to collect events. You need to configure...
Which of the following standards and guidelines can BEST address this organization’s need?
A global retail organization is looking to implement a consistent Disaster Recovery and Business Continuity Process across all of its business units. Which of the following standards and guidelines can BEST address this organization’s need?A . International Organization for Standardizations C 22301 (ISO-22301)B . Information Technology Infrastructure Library (ITIL)C ....
Which of the following is considered the MOST effective tool against social engineering?
Which of the following is considered the MOST effective tool against social engineering?A . Effective Security Vulnerability Management ProgramB . Anti-malware toolsC . Effective Security awareness programD . Anti-phishing toolsView AnswerAnswer: C
What immediate action should the information security manager take?
A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should the information security manager take?A . Enforce the existing security standards and do not allow the deployment of the new technology.B...
The PRIMARY objective of security awareness is to:
The PRIMARY objective of security awareness is to:A . Encourage security-conscious behaviorB . Put employees on notice in case follow-up action for noncompliance is necessaryC . Ensure that security policies are read.View AnswerAnswer: A
The single most important consideration to make when developing your security program, policies, and processes is:
The single most important consideration to make when developing your security program, policies, and processes is:A . Alignment with the businessB . Budgeting for unforeseen data compromisesC . Establishing your authority as the Security ExecutiveD . Streaming for efficiencyView AnswerAnswer: A