Which of the following is MOST likely to be discretionary?

Which of the following is MOST likely to be discretionary?A . PoliciesB . ProceduresC . GuidelinesD . StandardsView AnswerAnswer: C

June 12, 2021 No Comments READ MORE +

One of the MAIN goals of a Business Continuity Plan is to

One of the MAIN goals of a Business Continuity Plan is toA . Ensure all infrastructure and applications are available in the event of a disasterB . Allow all technical first-responders to understand their roles in the event of a disasterC . Provide step by step plans to recover business...

June 12, 2021 No Comments READ MORE +

To have accurate and effective information security policies how often should the CISO review the organization policies?

Topic 2, IS Management Controls and Auditing Management To have accurate and effective information security policies how often should the CISO review the organization policies?A . Every 6 monthsB . QuarterlyC . Before an auditD . At least once a yearView AnswerAnswer: D

June 12, 2021 No Comments READ MORE +

Within an organization’s vulnerability management program, who has the responsibility to implement remediation actions?

Within an organization’s vulnerability management program, who has the responsibility to implement remediation actions?A . Security officerB . Data ownerC . Vulnerability engineerD . System administratorView AnswerAnswer: D

June 11, 2021 No Comments READ MORE +

What is the BEST way to achieve on-going compliance monitoring in an organization?

What is the BEST way to achieve on-going compliance monitoring in an organization?A . Only check compliance right before the auditors are scheduled to arrive onsite.B . Outsource compliance to a 3rd party vendor and let them manage the program.C . Have Compliance and Information Security partner to correct issues...

June 11, 2021 No Comments READ MORE +

Which of the following are the MOST important factors for proactively determining system vulnerabilities?

Which of the following are the MOST important factors for proactively determining system vulnerabilities?A . Subscribe to vendor mailing list to get notification of system vulnerabilitiesB . Deploy Intrusion Detection System (IDS) and install anti-virus on systemsC . Configure firewall, perimeter router and Intrusion Prevention System (IPS)D . Conduct security...

June 11, 2021 No Comments READ MORE +

Who must be informed of this incident?

A Security Operations Centre (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen and the database server was disconnected. Who must be informed of this incident?A . Internal auditB . The data ownerC . All executive staffD . Government...

June 11, 2021 No Comments READ MORE +

Which of the following is the MOST likely reason for the policy shortcomings?

A security professional has been promoted to be the CISO of an organization. The first task is to create a security policy for this organization. The CISO creates and publishes the security policy. This policy however, is ignored and not enforced consistently. Which of the following is the MOST likely...

June 11, 2021 No Comments READ MORE +

Which of the following international standards can be BEST used to define a Risk Management process in an organization?

Which of the following international standards can be BEST used to define a Risk Management process in an organization?A . National Institute for Standards and Technology 800-50 (NIST 800-50)B . International Organization for Standardizations C 27005 (ISO-27005)C . Payment Card Industry Data Security Standards (PCI-DSS)D . International Organization for Standardizations...

June 10, 2021 No Comments READ MORE +

Which of the following has the GREATEST impact on the implementation of an information security governance model?

Which of the following has the GREATEST impact on the implementation of an information security governance model?A . Organizational budgetB . Distance between physical locationsC . Number of employeesD . Complexity of organizational structureView AnswerAnswer: D

June 10, 2021 No Comments READ MORE +