View Mode
Q: 11
Which of the following is NOT an ethical canon of the ISC2?
Options
Q: 12
What is the main purpose of an Acceptable Use Policy (AUP)?
Options
Q: 13
Suppose that an organization wants to implement measures to strengthen its detective access controls. Which one of these tools should they implement?
Options
Q: 14
Which of these is the PRIMARY objective of the PCI-DSS standard?
Options
Q: 15
Which category of cloud services does a ready-to-use email service fall into?
Options
Q: 16
In unified cloud storage, which solution can be used to separate access to patient records from administrative data without moving servers into different networks?
Options
Q: 17
What is the best technology for detecting unauthorized storage of sensitive data on hard drives?
Options
Q: 18
In which of the following access control models can the creator of an object delegate permission?
Options
Q: 19
Which of the following is NOT a feature of a cryptographic hash function?
Options
Q: 20

Which of the following is an example of a technical security control?

Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE