Minimum standards for securing the technical infrastructure should be defined in a security:

Minimum standards for securing the technical infrastructure should be defined in a security:A . strategy.B . guidelines.C . model.D . architecture.View AnswerAnswer: D Explanation: Minimum standards for securing the technical infrastructure should be defined in a security architecture document. This document defines how components are secured and the security services...

June 14, 2020 No Comments READ MORE +

Which of the following characteristics is MOST important when looking at prospective candidates for the role of chief information security officer (CISO)?

Which of the following characteristics is MOST important when looking at prospective candidates for the role of chief information security officer (CISO)?A . Knowledge of information technology platforms, networks and development methodologiesB . Ability to understand and map organizational needs to security technologiesC . Knowledge of the regulatory environment and...

June 14, 2020 No Comments READ MORE +

Which of the following are likely to be updated MOST frequently?

Which of the following are likely to be updated MOST frequently?A . Procedures for hardening database serversB . Standards for password length and complexityC . Policies addressing information security governanceD . Standards for document retention and destructionView AnswerAnswer: A Explanation: Policies and standards should generally be more static and less...

June 14, 2020 No Comments READ MORE +

Retention of business records should PRIMARILY be based on:

Retention of business records should PRIMARILY be based on:A . business strategy and direction.B . regulatory and legal requirements.C . storage capacity and longevity.D . business ease and value analysis.View AnswerAnswer: B Explanation: Retention of business records is generally driven by legal and regulatory requirements. Business strategy and direction would...

June 14, 2020 No Comments READ MORE +

To achieve effective strategic alignment of security initiatives, it is important that:

To achieve effective strategic alignment of security initiatives, it is important that:A . Steering committee leadership be selected by rotation.B . Inputs be obtained and consensus achieved between the major organizational units.C . The business strategy be updated periodically.D . Procedures and standards be approved by all departmental heads.View AnswerAnswer:...

June 13, 2020 No Comments READ MORE +

Which of the following would be MOST effective in successfully implementing restrictive password policies?

Which of the following would be MOST effective in successfully implementing restrictive password policies?A . Regular password auditsB . Single sign-on systemC . Security awareness programD . Penalties for noncomplianceView AnswerAnswer: C Explanation: To be successful in implementing restrictive password policies, it is necessary to obtain the buy-in of the...

June 13, 2020 No Comments READ MORE +

Senior management commitment and support for information security can BEST be obtained through presentations that:

Senior management commitment and support for information security can BEST be obtained through presentations that:A . use illustrative examples of successful attacks.B . explain the technical risks to the organization.C . evaluate the organization against best security practices.D . tie security risks to key business objectives.View AnswerAnswer: D Explanation: Senior...

June 13, 2020 No Comments READ MORE +

Who is ultimately responsible for the organization's information?

Who is ultimately responsible for the organization's information?A . Data custodianB . Chief information security officer (CISO)C . Board of directorsD . Chief information officer (CIO)View AnswerAnswer: C Explanation: The board of directors is ultimately responsible for the organization's information and is tasked with responding to issues that affect its...

June 13, 2020 No Comments READ MORE +

Which of the following is the MOST appropriate position to sponsor the design and implementation of a new security infrastructure in a large global enterprise?

Which of the following is the MOST appropriate position to sponsor the design and implementation of a new security infrastructure in a large global enterprise?A . Chief security officer (CSO)B . Chief operating officer (COO)C . Chief privacy officer (CPO)D . Chief legal counsel (CLC)View AnswerAnswer: B Explanation: The chief...

June 13, 2020 No Comments READ MORE +

Which of the following is the MOST important factor when designing information security architecture?

Which of the following is the MOST important factor when designing information security architecture?A . Technical platform interfacesB . Scalability of the networkC . Development methodologiesD . Stakeholder requirementsView AnswerAnswer: D Explanation: The most important factor for information security is that it advances the interests of the business, as defined...

June 13, 2020 No Comments READ MORE +