Relying on which of the following methods when detecting new threats using IDS should be of MOST concern?
Relying on which of the following methods when detecting new threats using IDS should be of MOST concern?A . Statistical pattern recognitionB . Attack signaturesC . Heuristic analysisD . Traffic analysisView AnswerAnswer: A
Which of the following is the STRONGEST justification foi granting an exception to the policy?
An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification foi granting an exception to the policy?A . Access is restricted to read-only.B . USB storage devices are enabled based on user rolesC . Users accept...
Which of the following sites would be MOST appropriate in the case of a very short recovery time objective (RTO)?
Which of the following sites would be MOST appropriate in the case of a very short recovery time objective (RTO)?A . RedundantB . SharedC . WarmD . MobileView AnswerAnswer: A
Which of the following is the PRIMARY objective of a business impact analysis (BIA):
Which of the following is the PRIMARY objective of a business impact analysis (BIA):A . Define the recovery point objective (RPO).B . Determine recovery priorities.C . Confirm control effectiveness.D . Analyze vulnerabilitiesView AnswerAnswer: A
Meeting which of the following security objectives BEST ensures that information is protected against unauthorized modification?
Meeting which of the following security objectives BEST ensures that information is protected against unauthorized modification?A . AvailabilityB . IntegrityC . ConfidentialityD . AuthenticityView AnswerAnswer: C
Which of the following external entities would provide the BEST guideance to an organization facing advanced attacks?
Which of the following external entities would provide the BEST guideance to an organization facing advanced attacks?A . Recognised threat intelligence communitiesB . Open-source reconnaissanceC . Disaster recovery consultants widely endorsed in industry forumsD . Incident response experts from highly regarded peer organizationsView AnswerAnswer: A
The MOST important factors in determining the scope and timing for testing a business continuity plan are:
The MOST important factors in determining the scope and timing for testing a business continuity plan are:A . the experience level of personnel and the function location.B . prior testing results and the degree of detail of the business continuity planC . the importance of the function to be tested...
Which of the following is the BEST indication that a recently adopted information security framework is a good fit for an organization?
Which of the following is the BEST indication that a recently adopted information security framework is a good fit for an organization?A . The framework includes industry-recognized information security best practices.B . The number of security incidents has significantly declinedC . The business has obtained framework certification.D . Objectives in...
Which of the following is the MOST important driver when developing an effective information security strategy?
Which of the following is the MOST important driver when developing an effective information security strategy?A . Information security standardsB . Compliance requirementsC . Security audit reportsD . Benchmarking reportsView AnswerAnswer: B
Which of the following should be PRIMARILY included in a security training program for business process owners?
Which of the following should be PRIMARILY included in a security training program for business process owners?A . Application recovery timeB . Impact of security risksC . Application vulnerabilitiesD . List of security incidents reportedView AnswerAnswer: B