A method to transfer risk is to______________.

A method to transfer risk is to______________.A . Implement redundancyB . Move operations to another regionC . Alignment with business operationsD . Purchase breach insuranceView AnswerAnswer: D

October 9, 2019 No Comments READ MORE +

What is the NEXT logical step in applying the controls in the organization?

An organization has defined a set of standard security controls. This organization has also defined the circumstances and conditions in which they must be applied. What is the NEXT logical step in applying the controls in the organization?A . Determine the risk toleranceB . Perform an asset classificationC . Analyze...

October 9, 2019 No Comments READ MORE +

From an information security perspective, information that no longer supports the main purpose of the business should be:

From an information security perspective, information that no longer supports the main purpose of the business should be:A . protected under the information classification policyB . analyzed under the data ownership policyC . assessed by a business impact analysis.D . analyzed under the retention policy.View AnswerAnswer: D

October 8, 2019 No Comments READ MORE +

Which should NOT be changed or disabled on a connection server?

Which should NOT be changed or disabled on a connection server?A . Diagnostic System HostB . Remote Procedure CallC . Security CenterD . WLAN AutoConfigView AnswerAnswer: D

October 8, 2019 No Comments READ MORE +

How should you configure the query filter?

HOTSPOT Your network contains an Active Directory domain named contoso.com. You are deploying Microsoft Advanced Threat Analytics (ATA) to the domain. You install the ATA Gateway on a server named Server1. To assist in detecting Pass-the-Hash attacks, you plan to configure ATA Gateway to collect events. You need to configure...

October 7, 2019 No Comments READ MORE +

Which of the following standards and guidelines can BEST address this organization’s need?

A global retail organization is looking to implement a consistent Disaster Recovery and Business Continuity Process across all of its business units. Which of the following standards and guidelines can BEST address this organization’s need?A . International Organization for Standardizations C 22301 (ISO-22301)B . Information Technology Infrastructure Library (ITIL)C ....

October 7, 2019 No Comments READ MORE +

Which of the following is considered the MOST effective tool against social engineering?

Which of the following is considered the MOST effective tool against social engineering?A . Effective Security Vulnerability Management ProgramB . Anti-malware toolsC . Effective Security awareness programD . Anti-phishing toolsView AnswerAnswer: C

October 6, 2019 No Comments READ MORE +

What immediate action should the information security manager take?

A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should the information security manager take?A . Enforce the existing security standards and do not allow the deployment of the new technology.B...

October 6, 2019 No Comments READ MORE +

The PRIMARY objective of security awareness is to:

The PRIMARY objective of security awareness is to:A . Encourage security-conscious behaviorB . Put employees on notice in case follow-up action for noncompliance is necessaryC . Ensure that security policies are read.View AnswerAnswer: A

October 5, 2019 No Comments READ MORE +

The single most important consideration to make when developing your security program, policies, and processes is:

The single most important consideration to make when developing your security program, policies, and processes is:A . Alignment with the businessB . Budgeting for unforeseen data compromisesC . Establishing your authority as the Security ExecutiveD . Streaming for efficiencyView AnswerAnswer: A

October 3, 2019 No Comments READ MORE +