View Mode
Q: 1
A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:
Options
Q: 2
The PRIMARY objective for information security program development should be:
Options
Q: 3
A method to transfer risk is to:
Options
Q: 4
When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?
Options
Q: 5
Developing effective security controls is a balance between:
Options
Q: 6
A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should the information security manager take?
Options
Q: 7
SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team. What phase of the response provides measures to reduce the likelihood of an incident from recurring?
Options
Q: 8
Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years. Which of the following would be the FIRST step when addressing Information Security formally and consistently in this organization?
Options
Q: 9
Scenario: Your company has many encrypted telecommunications links for their world-wide operations. Physically distributing symmetric keys to all locations has proven to be administratively burdensome, but symmetric keys are preferred to other alternatives. Symmetric encryption in general is preferable to asymmetric encryption when:
Options
Q: 10
When dealing with Security Incident Response procedures, which of the following steps come FIRST when reacting to an incident?
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE