What is the MOST important consideration from a data security perspective when an organization plans to relocate?
What is the MOST important consideration from a data security perspective when an organization plans to relocate?A . Ensure the fire prevention and detection systems are sufficient to protect personnelB . Review the architectural plans to determine how many emergency exits are presentC . Conduct a gap analysis of a...
Which technique can be used to make an encryption scheme more resistant to a known plaintext attack?
Which technique can be used to make an encryption scheme more resistant to a known plaintext attack?A . Hashing the data before encryptionB . Hashing the data after encryptionC . Compressing the data after encryptionD . Compressing the data before encryptionView AnswerAnswer: D
What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?
What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?A . Audit logsB . Role-Based Access Control (RBAC)C . Two-factor authenticationD . Application of least privilegeView AnswerAnswer: B
Which of the following BEST describes the responsibilities of a data owner?
Which of the following BEST describes the responsibilities of a data owner?A . Ensuring quality and validation through periodic audits for ongoing data integrityB . Maintaining fundamental data availability, including data storage and archivingC . Ensuring accessibility to appropriate users, maintaining appropriate levels of data securityD . Determining the impact...
Which of the following actions should be performed when implementing a change to a database schema in a production system?
Which of the following actions should be performed when implementing a change to a database schema in a production system?A . Test in development, determine dates, notify users, and implement in productionB . Apply change to production, run in parallel, finalize change in production, and develop a back-out strategyC ....
When assessing an organization’s security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?
When assessing an organization’s security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?A . Only when assets are clearly definedB . Only when standards are definedC . Only when controls are put in placeD . Only procedures...
Which contract is BEST in offloading the task from the IT staff?
An organization has doubled in size due to a rapid market share increase. The size of the Information Technology (IT) staff has maintained pace with this growth. The organization hires several contractors whose onsite time is limited. The IT department has pushed its limits building servers and rolling out workstations...
What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?
What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?A . Implementation PhaseB . Initialization PhaseC . Cancellation PhaseD . Issued PhaseView AnswerAnswer: D
What does this MOST likely indicate?
A software scanner identifies a region within a binary image having high entropy . What does this MOST likely indicate?A . Encryption routinesB . Random number generatorC . Obfuscated codeD . Botnet command and controlView AnswerAnswer: C
What kind of reading material is MOST relevant to this project?
A security consultant has been asked to research an organization's legal obligations to protect privacy-related information . What kind of reading material is MOST relevant to this project?A . The organization's current security policies concerning privacy issuesB . Privacy-related regulations enforced by governing bodies applicable to the organizationC . Privacy...