When implementing a data classification program, why is it important to avoid too much granularity?
When implementing a data classification program, why is it important to avoid too much granularity?A . The process will require too many resourcesB . It will be difficult to apply to both hardware and softwareC . It will be difficult to assign ownership to the dataD . The process will...
An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?
An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?A . Development, testing, and deploymentB . Prevention, detection, and remediationC . People, technology, and operationsD . Certification, accreditation, and monitoringView AnswerAnswer: C
When is a Business Continuity Plan (BCP) considered to be valid?
When is a Business Continuity Plan (BCP) considered to be valid?A . When it has been validated by the Business Continuity (BC) managerB . When it has been validated by the board of directorsC . When it has been validated by all threat scenariosD . When it has been validated...
A disadvantage of an application filtering firewall is that it can lead to
A disadvantage of an application filtering firewall is that it can lead toA . a crash of the network as a result of user activities.B . performance degradation due to the rules applied.C . loss of packets on the network due to insufficient bandwidth.D . Internet Protocol (IP) spoofing by...
What is the BEST approach to addressing security issues in legacy web applications?
What is the BEST approach to addressing security issues in legacy web applications?A . Debug the security issuesB . Migrate to newer, supported applications where possibleC . Conduct a security assessmentD . Protect the legacy application with a web application firewallView AnswerAnswer: D
All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that
All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions thatA . determine the risk of a business interruption occurringB . determine the technological dependence of the business processesC . Identify the operational impacts of a business interruptionD . Identify the financial impacts...
Which of the following is the BEST solution for the manufacturing organization?
A manufacturing organization wants to establish a Federated Identity Management (FIM) system with its 20 different supplier companies . Which of the following is the BEST solution for the manufacturing organization?A . Trusted third-party certificationB . Lightweight Directory Access Protocol (LDAP)C . Security Assertion Markup language (SAML)D . Cross-certificationView AnswerAnswer:...
What is the MOST probable security feature of Java preventing the program from operating as intended?
A Java program is being developed to read a file from computer A and write it to computer B, using a third computer C. The program is not working as expected . What is the MOST probable security feature of Java preventing the program from operating as intended?A . Least...
At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?
At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?A . Link layerB . Physical layerC . Session layerD . Application layerView AnswerAnswer: D
A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?
A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?A . Guaranteed recovery of all business functionsB . Minimization of the need decision making during a crisisC . Insurance against litigation following a disasterD . Protection from loss of organization resourcesView AnswerAnswer: D