When implementing a data classification program, why is it important to avoid too much granularity?

When implementing a data classification program, why is it important to avoid too much granularity?A . The process will require too many resourcesB . It will be difficult to apply to both hardware and softwareC . It will be difficult to assign ownership to the dataD . The process will...

June 4, 2022 No Comments READ MORE +

An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?

An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?A . Development, testing, and deploymentB . Prevention, detection, and remediationC . People, technology, and operationsD . Certification, accreditation, and monitoringView AnswerAnswer: C

June 4, 2022 No Comments READ MORE +

When is a Business Continuity Plan (BCP) considered to be valid?

When is a Business Continuity Plan (BCP) considered to be valid?A . When it has been validated by the Business Continuity (BC) managerB . When it has been validated by the board of directorsC . When it has been validated by all threat scenariosD . When it has been validated...

June 4, 2022 No Comments READ MORE +

A disadvantage of an application filtering firewall is that it can lead to

A disadvantage of an application filtering firewall is that it can lead toA . a crash of the network as a result of user activities.B . performance degradation due to the rules applied.C . loss of packets on the network due to insufficient bandwidth.D . Internet Protocol (IP) spoofing by...

June 4, 2022 No Comments READ MORE +

What is the BEST approach to addressing security issues in legacy web applications?

What is the BEST approach to addressing security issues in legacy web applications?A . Debug the security issuesB . Migrate to newer, supported applications where possibleC . Conduct a security assessmentD . Protect the legacy application with a web application firewallView AnswerAnswer: D

June 4, 2022 No Comments READ MORE +

All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that

All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions thatA . determine the risk of a business interruption occurringB . determine the technological dependence of the business processesC . Identify the operational impacts of a business interruptionD . Identify the financial impacts...

June 3, 2022 No Comments READ MORE +

Which of the following is the BEST solution for the manufacturing organization?

A manufacturing organization wants to establish a Federated Identity Management (FIM) system with its 20 different supplier companies . Which of the following is the BEST solution for the manufacturing organization?A . Trusted third-party certificationB . Lightweight Directory Access Protocol (LDAP)C . Security Assertion Markup language (SAML)D . Cross-certificationView AnswerAnswer:...

June 3, 2022 No Comments READ MORE +

What is the MOST probable security feature of Java preventing the program from operating as intended?

A Java program is being developed to read a file from computer A and write it to computer B, using a third computer C. The program is not working as expected . What is the MOST probable security feature of Java preventing the program from operating as intended?A . Least...

June 3, 2022 No Comments READ MORE +

At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?

At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?A . Link layerB . Physical layerC . Session layerD . Application layerView AnswerAnswer: D

June 3, 2022 No Comments READ MORE +

A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?

A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?A . Guaranteed recovery of all business functionsB . Minimization of the need decision making during a crisisC . Insurance against litigation following a disasterD . Protection from loss of organization resourcesView AnswerAnswer: D

June 2, 2022 No Comments READ MORE +