What is the relationship between information protection and regulatory compliance?

What is the relationship between information protection and regulatory compliance?A . That all information in an organization must be protected equally. B. The information required to be protected by regulatory mandate does not have to be identified in the organizations data classification policy. C. That the protection of some information...

November 4, 2022 No Comments READ MORE +

Who is responsible for securing networks during a security incident?

Who is responsible for securing networks during a security incident?A . Chief Information Security Officer (CISO) B. Security Operations Center (SO C. Disaster Recovery (DR) manager D. Incident Response Team (IRT)View AnswerAnswer: D

November 4, 2022 No Comments READ MORE +

From an information security perspective, information that no longer supports the main purpose of the business should be:

From an information security perspective, information that no longer supports the main purpose of the business should be:A . assessed by a business impact analysis. B. protected under the information classification policy. C. analyzed under the data ownership policy. D. analyzed under the retention policyView AnswerAnswer: D

November 4, 2022 No Comments READ MORE +

When creating a vulnerability scan schedule, who is the MOST critical person to communicate with in order to ensure impact of the scan is minimized?

When creating a vulnerability scan schedule, who is the MOST critical person to communicate with in order to ensure impact of the scan is minimized?A . The asset owner B. The asset manager C. The data custodian D. The project managerView AnswerAnswer: A

November 3, 2022 No Comments READ MORE +

The alerting, monitoring and life-cycle management of security related events is typically handled by the

The alerting, monitoring and life-cycle management of security related events is typically handled by theA . security threat and vulnerability management process B. risk assessment process C. risk management process D. governance, risk, and compliance toolsView AnswerAnswer: A

November 3, 2022 No Comments READ MORE +

Information security policies should be reviewed:

Information security policies should be reviewed:A . by stakeholders at least annually B. by the CISO when new systems are brought online C. by the Incident Response team after an audit D. by internal audit semiannuallyView AnswerAnswer: A

November 3, 2022 No Comments READ MORE +

Credit card information, medical data, and government records are all examples of:

Credit card information, medical data, and government records are all examples of:A . Confidential/Protected Information B. Bodily Information C. Territorial Information D. Communications InformationView AnswerAnswer: A

November 3, 2022 No Comments READ MORE +

The Information Security Governance program MUST:

The Information Security Governance program MUST:A . integrate with other organizational governance processes B. support user choice for Bring Your Own Device (BYOD) C. integrate with other organizational governance processes D. show a return on investment for the organizationView AnswerAnswer: A

November 3, 2022 No Comments READ MORE +

A Security Operations Centre (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen and the database server was disconnected. Who must be informed of this incident?

A Security Operations Centre (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen and the database server was disconnected. Who must be informed of this incident?A . Internal audit B. The data owner C. All executive staff D. Government...

November 3, 2022 No Comments READ MORE +

Who in the organization determines access to information?

Who in the organization determines access to information?A . Legal department B. Compliance officer C. Data Owner D. Information security officerView AnswerAnswer: C

November 3, 2022 No Comments READ MORE +