An organization’s information security strategic plan MUST be reviewed

An organization’s information security strategic plan MUST be reviewedA . whenever there are significant changes to a major application.B . quarterly, when the organization’s strategic plan is updated.C . whenever there are major changes to the business.D . every three years, when the organization’s strategic plan is updated.View AnswerAnswer: C

March 30, 2019 No Comments READ MORE +

Which technology is a prerequisite for populating the cloud-based directory in a federated identity solution?

Which technology is a prerequisite for populating the cloud-based directory in a federated identity solution?A . Notification toolB . Message queuing toolC . Security token toolD . Synchronization toolView AnswerAnswer: C

March 29, 2019 No Comments READ MORE +

Which security service is served by the process of encryption plaintext with the sender’s private key and decrypting cipher text with the sender’s public key?

Which security service is served by the process of encryption plaintext with the sender’s private key and decrypting cipher text with the sender’s public key?A . ConfidentialityB . IntegrityC . IdentificationD . AvailabilityView AnswerAnswer: A

March 29, 2019 1 Comment READ MORE +

The controls that usually require a human to evaluate the input from sensors or cameras to determine if a real threat exists are associated with:

The controls that usually require a human to evaluate the input from sensors or cameras to determine if a real threat exists are associated with:A .  Preventive/physicalB .  Detective/technicalC .  Detective/physicalD .  Detective/administrativeView AnswerAnswer: C Explanation: Detective/physical controls usually require a human to evaluate the input from sensors or cameras...

March 29, 2019 No Comments READ MORE +

Which of the following is the MOST important factor for selecting performance metrics in this scenario?

FOR THIS QUESTION, REFER TO THE FOLLOWING INFORMATION An organization has implemented several new security controls. To assess the impact of these controls on increasing the effectiveness of the security program, a number of information security performance metrics are being monitored. Which of the following is the MOST important factor...

March 29, 2019 No Comments READ MORE +

What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?

What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?A . Disable all unnecessary servicesB . Ensure chain of custodyC . Prepare another backup of the systemD . Isolate the system from the networkView AnswerAnswer: D

March 29, 2019 No Comments READ MORE +

What is the FIRST step that should be considered in a penetration test?

What is the FIRST step that should be considered in a penetration test?A . The approval of change control management.B . The development of a detailed test plan.C . The formulation of specific management objectives.D . The communication process among team members.View AnswerAnswer: C

March 29, 2019 No Comments READ MORE +

If the computer system being used contains confidential information, users must not:

If the computer system being used contains confidential information, users must not:A . Leave their computer without first logging off.B . Share their desks.C . Encrypt their passwords.D . CommunicateView AnswerAnswer: A

March 29, 2019 No Comments READ MORE +

What is the company benefit, in terms of risk, for people taking a vacation of a specified minimum length?

What is the company benefit, in terms of risk, for people taking a vacation of a specified minimum length?A . Reduces stress levels, thereby lowering insurance claims.B . Improves morale, thereby decreasing errors.C . Increases potential for discovering frauds.D . Reduces dependence on critical individuals.View AnswerAnswer: C

March 29, 2019 No Comments READ MORE +

When evaluating third-party applications, which of the following is the GREATEST responsibility of Information Security?

When evaluating third-party applications, which of the following is the GREATEST responsibility of Information Security?A . Accept the risk on behalf of the organization.B . Report findings to the business to determine security gaps.C . Quantify the risk to the business for product selection.D . Approve the application that best...

March 29, 2019 No Comments READ MORE +