Which of the following is the MOST important reason why…
Which of the following is the MOST important reason why information security objectives should be defined?
Which of the following controls would BEST prevent acci…
Which of the following controls would BEST prevent accidental system shutdown from the console or
operations area?
The MAIN reason for deploying a public key infrastructu…
The MAIN reason for deploying a public key infrastructure (PKI) when implementing an information security
program is to:
which of the following to ensure effective implementati…
Priority should be given to which of the following to ensure effective implementation of information security
governance?
The PRIMARY driver to obtain external resources to exec…
The PRIMARY driver to obtain external resources to execute the information security program is that external
resources can:
In order to protect a network against unauthorized exte…
In order to protect a network against unauthorized external connections to corporate systems, the information
security manager should BEST implement:
The MOST effective way to ensure that outsourced servic…
The MOST effective way to ensure that outsourced service providers comply with the organization’s information
security policy would be:
which phase of the project?
A test plan to validate the security controls of a new system should be developed during which phase of the
project?
The vulnerability identified is:
An internal review of a web-based application system finds the ability to gain access to all employees’ accounts
by changing the employee’s ID on the URL used for accessing the account. The vulnerability identified is:
The PRIMARY objective of an Internet usage policy is to…
The PRIMARY objective of an Internet usage policy is to prevent: