Question: Q1: In an organization implementing a data classification program, ultimate responsibility for the data on the database server lies with the: * A. information security

Q1: In an organization implementing a data classification program, ultimate responsibility for the data on the database server lies with the: * A. information security manager * B. business unit manager. C. database administrator (DBA). D. information technology manager

Q2: An organization is considering a self-service solution for the deployment of virtualized development servers. Which of the following should be the information security managers PRIMARY concern? * A. Ability to maintain server security baseline B. Ability to remain current with patches C. Generation of excessive security event logs * D. Segregation of servers from the production environment

Q3: When developing security standards, which of the following would be MOST appropriate to include? A. Accountability for licenses * B. Acceptable use of IT assets * C. Operating system requirements D. Inventory management

Q4: Which of the following is the GREATEST security threat when an organization allows remote access to a virtual private network (VPN)? A. Client logins are subject to replay attack * B. Compromised VPN clients could impact the network C. Attackers could compromise the VPN gateway * D. VPN traffic could be sniffed and captured

Q5: The authorization to transfer the handling of an internal security incident to a third-party support provider is PRIMARILY defined by the: A. information security manager * B. escalation procedures C. disaster recovery plan * D. chain of custody

Q6: When defining responsibilities with a cloud computing vendor, which of the following should be regarded as a shared responsibility between user and provider? * A. Data ownership B. Access log review C. Application logging * D. Incident response

Q7: Which of the following is the defense against distributed denial of service (DDoS) attacks? * A. Multiple and redundant paths * B. Well-configured routers and firewalls C. Regular patching D. Intruder-detection lockout

Q8: An organization shares customer information across its globally dispersed branches. Which of the following should be the GREATEST concern to information security management? A. Cross-cultural differences between branches * B. Conflicting data protection regulations * C. Insecure wide area networks (WANs) D. Decentralization of information security

Q9: Utilizing external resources for highly technical information security tasks allows an information security manager to: A. distribute technology risk * B. leverage limited resources C. outsource responsibility * D. transfer business risk

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!