What will be your answer?
You work as a security manager for SoftTech Inc. You are conducting a security awareness
campaign for your employees. One of the employees of your organization asks you the purpose of
the security awareness, training and education program. What will be your answer?
Which of the following policies describes the national policy on the secure electronic messaging service
Which of the following policies describes the national policy on the secure electronic messaging
service
which proves that the sender really sent a particular message?
Which of the following terms refers to a mechanism which proves that the sender really sent a
particular message?
What is this called?
You are responsible for network and information security at a metropolitan police station. The most
important concern is that unauthorized parties are not able to access data. What is this called?
Which of the following is a subset discipline of Corporate Governance focused on information security systems
Which of the following is a subset discipline of Corporate Governance focused on information
security systems and their performance and risk management
Which of the following types of hardware devices will Adam use to implement two-factor authentication?
Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to
implement two-factor authentication for the employees to access their networks. He has told him
that he would like to use some type of hardware device in tandem with a security or identifying pin
number. Adam decides to implement smart cards but they are not cost effective. Which of the
following types of hardware devices will Adam use to implement two-factor authentication?
What component of the change management system is responsible for evaluating, testing, and documenting changes
What component of the change management system is responsible for evaluating, testing, and
documenting changes created to the project scope?
Choose all that apply
Which of the following principles are defined by the IATF model Each correct answer represents a
complete solution. Choose all that apply.
Which of the following techniques will she use to fulfill this requirement?
Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network
traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key
block cipher. Which of the following techniques will she use to fulfill this requirement?
Which of the following is/are a type of electronic communication?
Electronic communication technology refers to technology devices, such as computers and cell
phones, used to facilitate communication. Which of the following is/are a type of electronic
communication? Each correct answer represents a complete solution. Choose all that apply.