The MOST important characteristic of good security policies is that they:
The MOST important characteristic of good security policies is that they:
Which one of the following statements best addresses when a project risk actually happens?
You are a project manager for your organization and you’re working with four of your key
stakeholders. One of the stakeholders is confused as to why you’re not discussing the current
problem in the project during the risk identification meeting. Which one of the following statements
best addresses when a project risk actually happens?
(fill-in-the-blank)
Although BCP and DRP are often implemented and tested by middle management and end users,
the ultimate responsibility and accountability for the plans remain with executive
management, such as the _______________. (fill-in-the-blank)
Which of the following are the main objectives of the Performance measurement domain?
Which of the following are the main objectives of the Performance measurement domain? Each
correct answer represents a complete solution. Choose all that apply.
An information security manager must understand the relationship between information security and business ope
An information security manager must understand the relationship between information security
and business operations in order to:
Which of the following is the MOST effective method for indicating that the risk level is approaching a high o
Which of the following is the MOST effective method for indicating that the risk level is
approaching a high or unacceptable level of risk?
True or false?
Obtaining user approval of program changes is very effective for controlling application changes
and maintenance. True or false?
Which of the following techniques is NOT used as a tool in qualitative risk analysis process?
You work as a project manager for TechSoft Inc. You are working with the project stakeholders on
the qualitative risk analysis process in your project. You have used all the tools to the qualitative
risk analysis process in your project. Which of the following techniques is NOT used as a tool in
qualitative risk analysis process?
Obtaining senior management support for establishing a warm site can BEST be accomplished by:
Obtaining senior management support for establishing a warm site can BEST be accomplished by:
The MOST effective approach to address issues that arise between IT management, business units and security ma
The MOST effective approach to address issues that arise between IT management, business
units and security management when implementing a new security strategy is for the information
security manager to: