Which of the following should be determined while defining risk management strategies?
Which of the following should be determined while defining risk management strategies?A . Organizational objectives and risk toleranceB . Enterprise disaster recovery plansC . Risk assessment criteriaD . IT architecture complexityView AnswerAnswer: A
Which of the following intellectual Property components is focused on maintaining brand recognition?
Which of the following intellectual Property components is focused on maintaining brand recognition?A . TrademarkB . Research LogsC . CopyrightD . PatentView AnswerAnswer: A
The framework that helps to define a minimum standard of protection that business stakeholders must attempt to achieve is referred to as a standard of:
The framework that helps to define a minimum standard of protection that business stakeholders must attempt to achieve is referred to as a standard of:A . Due CompromiseB . Due processC . Due CareD . Due ProtectionView AnswerAnswer: C
Who must be informed of this incident?
A Security Operations Centre (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen and the database server was disconnected. Who must be informed of this incident?A . Internal auditB . The data ownerC . All executive staffD . Government...
If your organization operates under a model of "assumption of breach", you should:
If your organization operates under a model of "assumption of breach", you should:A . Establish active firewall monitoring protocolsB . Purchase insurance for your compliance liabilityC . Focus your security efforts on high value assetsD . Protect all information resource assets equallyView AnswerAnswer: B
Developing effective security controls is a balance between:
Developing effective security controls is a balance between:A . Technology and Vendor ManagementB . Operations and RegulationsC . Risk Management and OperationsD . Corporate Culture and Job ExpectationsView AnswerAnswer: C
Which of the following is of MOST importance when security leaders of an organization are required to align security to influence the culture of an organization?
Which of the following is of MOST importance when security leaders of an organization are required to align security to influence the culture of an organization?A . Understand the business goals of the organizationB . Poses a strong technical backgroundC . Poses a strong auditing backgroundD . Understand all regulations...
Which of the following is the MOST likely reason for the policy shortcomings?
A security professional has been promoted to be the CISO of an organization. The first task is to create a security policy for this organization. The CISO creates and publishes the security policy. This policy however, is ignored and not enforced consistently. Which of the following is the MOST likely...
The PRIMARY objective for information security program development should be:
The PRIMARY objective for information security program development should be:A . Reducing the impact of the risk to the business.B . Establishing incident response programs.C . Establishing strategic alignment with business continuity requirements.D . Identifying and implementing the best security solutions.View AnswerAnswer: A
You are updating the inventory worksheet for a local tree farm
SIMULATION Project 3 of 7: Tree Inventory Overview You are updating the inventory worksheet for a local tree farm. Hide rows 29 and 30.View AnswerAnswer: See explanation below.