Question: Q1: In an organization implementing a data classification program, ultimate responsibility for the data on the database server lies with the: * A. information security
Q1: In an organization implementing a data classification program, ultimate responsibility for the data on the database server lies with the: * A. information security manager * B. business unit manager. C. database administrator (DBA). D. information technology manager
Q2: An organization is considering a self-service solution for the deployment of virtualized development servers. Which of the following should be the information security managers PRIMARY concern? * A. Ability to maintain server security baseline B. Ability to remain current with patches C. Generation of excessive security event logs * D. Segregation of servers from the production environment
Q3: When developing security standards, which of the following would be MOST appropriate to include? A. Accountability for licenses * B. Acceptable use of IT assets * C. Operating system requirements D. Inventory management
Q4: Which of the following is the GREATEST security threat when an organization allows remote access to a virtual private network (VPN)? A. Client logins are subject to replay attack * B. Compromised VPN clients could impact the network C. Attackers could compromise the VPN gateway * D. VPN traffic could be sniffed and captured
Q5: The authorization to transfer the handling of an internal security incident to a third-party support provider is PRIMARILY defined by the: A. information security manager * B. escalation procedures C. disaster recovery plan * D. chain of custody
Q6: When defining responsibilities with a cloud computing vendor, which of the following should be regarded as a shared responsibility between user and provider? * A. Data ownership B. Access log review C. Application logging * D. Incident response
Q7: Which of the following is the defense against distributed denial of service (DDoS) attacks? * A. Multiple and redundant paths * B. Well-configured routers and firewalls C. Regular patching D. Intruder-detection lockout
Q8: An organization shares customer information across its globally dispersed branches. Which of the following should be the GREATEST concern to information security management? A. Cross-cultural differences between branches * B. Conflicting data protection regulations * C. Insecure wide area networks (WANs) D. Decentralization of information security
Q9: Utilizing external resources for highly technical information security tasks allows an information security manager to: A. distribute technology risk * B. leverage limited resources C. outsource responsibility * D. transfer business risk
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
