Which of the following intellectual Property components is focused on maintaining brand recognition?
Which of the following intellectual Property components is focused on maintaining brand recognition?A . TrademarkB . PatentC . Research LogsD . CopyrightView AnswerAnswer: A
Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?
Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?A . Audit and LegalB . Budget and ComplianceC . Human Resources and BudgetD . Legal and Human ResourcesView AnswerAnswer: A
Who is responsible for securing networks during a security incident?
Who is responsible for securing networks during a security incident?A . Chief Information Security Officer (CISO)B . Security Operations Center (SOC . Disaster Recovery (DR) managerD . Incident Response Team (IRT)View AnswerAnswer: D
The establishment of a formal risk management framework and system authorization program is essential.
The establishment of a formal risk management framework and system authorization program is essential. The LAST step of the system authorization process is:A . Contacting the Internet Service Provider for an IP scopeB . Getting authority to operate the system from executive managementC . Changing the default passwordsD . Conducting...
What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?
What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?A . Determine appetiteB . Evaluate risk avoidance criteriaC . Perform a risk assessmentD . Mitigate riskView AnswerAnswer: D
From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?
You have recently drafted a revised information security policy. From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?A . Chief Information Security OfficerB . Chief Executive OfficerC . Chief Information OfficerD . Chief Legal CounselView AnswerAnswer: B
When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?
When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?A . An independent Governance, Risk and Compliance organizationB . Alignment of security goals with business goalsC . Compliance with local privacy regulationsD . Support from Legal and...
The single most important consideration to make when developing your security program, policies, and processes is:
The single most important consideration to make when developing your security program, policies, and processes is:A . Budgeting for unforeseen data compromisesB . Streamlining for efficiencyC . Alignment with the businessD . Establishing your authority as the Security ExecutiveView AnswerAnswer: C
Which of the following most commonly falls within the scope of an information security governance steering committee?
Which of the following most commonly falls within the scope of an information security governance steering committee?A . Approving access to critical financial systemsB . Developing content for security awareness programsC . Interviewing candidates for information security specialist positionsD . Vetting information security policiesView AnswerAnswer: D
Which of the following is a MAJOR consideration when an organization retains sensitive customer data and uses this data to better target the organization’s products and services?
Which of the following is a MAJOR consideration when an organization retains sensitive customer data and uses this data to better target the organization’s products and services?A . Strong authentication technologiesB . Financial reporting regulationsC . Credit card compliance and regulationsD . Local privacy lawsView AnswerAnswer: D