In accordance with best practices and international standards, how often is security awareness training provided to employees of an organization?

In accordance with best practices and international standards, how often is security awareness training provided to employees of an organization?A . Every 18 monthsB . Every 12 monthsC . High risk environments 6 months, low risk environments 12 monthsD . Every 6 monthsView AnswerAnswer: B

September 27, 2019 No Comments READ MORE +

Information security policies should be reviewed _____________________.

Information security policies should be reviewed _____________________.A . by the internal audit semiannuallyB . by the CISO when new systems are brought onlineC . by the Incident Response team after an auditD . by stakeholders at least annuallyView AnswerAnswer: D

September 26, 2019 No Comments READ MORE +

Which of the following is MOST likely to be discretionary?

Which of the following is MOST likely to be discretionary?A . PoliciesB . ProceduresC . GuidelinesD . StandardsView AnswerAnswer: C

September 26, 2019 No Comments READ MORE +

The alerting, monitoring and life-cycle management of security related events is typically handled by the_________________.

The alerting, monitoring and life-cycle management of security related events is typically handled by the_________________.A . risk management processB . risk assessment processC . governance, risk, and compliance toolsD . security threat and vulnerability management processView AnswerAnswer: D

September 24, 2019 No Comments READ MORE +

Which of the following has the GREATEST impact on the implementation of an information security governance model?

Which of the following has the GREATEST impact on the implementation of an information security governance model?A . Complexity of organizational structureB . Distance between physical locationsC . Organizational budgetD . Number of employeesView AnswerAnswer: A

September 24, 2019 No Comments READ MORE +

Which of the following qualifications and experience would be MOST desirable to find in a candidate?

A company wants to fill a Chief Information Security Officer position in the organization. They need to define and implement a more holistic security program. Which of the following qualifications and experience would be MOST desirable to find in a candidate?A . Industry certifications, technical knowledge and program management skillsB...

September 24, 2019 No Comments READ MORE +

You have recently drafted a revised information security policy. From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?

You have recently drafted a revised information security policy. From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?A . Chief Executive OfficerB . Chief Information OfficerC . Chief Information Security OfficerD . Chief Information OfficerView AnswerAnswer: A

September 23, 2019 No Comments READ MORE +

When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?

When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?A . Compliance with local privacy regulationsB . An independent Governance, Risk and Compliance organizationC . Support Legal and HR teamsD . Alignment of security goals with business...

September 23, 2019 No Comments READ MORE +

Ensuring that the actions of a set of people, applications and systems follow the organization’s rules is BEST described as:

Ensuring that the actions of a set of people, applications and systems follow the organization’s rules is BEST described as:A . Compliance managementB . Security managementC . Risk managementD . Mitigation managementView AnswerAnswer: A

September 22, 2019 No Comments READ MORE +

Credit card information, medical data, and government records are all examples of:

Credit card information, medical data, and government records are all examples of:A . NoneB . Communications InformationC . Bodily InformationD . Confidential/Protected InformationE . Territorial InformationView AnswerAnswer: D

September 22, 2019 No Comments READ MORE +