Exam 9 Questions.

  • Security and Risk Management
  • Communication and Network Security
  • Security Assessment and Testing
  • Identity and Access Management (IAM)
  • Asset Security
  • General Security Principles
  • Security Operations
  • Software Development Security
  • Security Architecture and Engineering

Page 1 of 9

Security and Risk Management

1. When developing an organization's information security budget, which of the following is the MOST important consideration?{
2. An organization operates a legacy Industrial Control System (ICS) that must be managed remotely via outdated software. How can this risk be BEST managed?{
3. What is the PRIMARY purpose of creating and reporting metrics for a security awareness, training, and education program?{
4. Which of the following BEST describes why software assurance is critical in helping prevent an increase in business and mission risk for an organization?{
5. What is a risk of using commercial off-the-shelf (COTS) products?{
6. Which of the following poses the GREATEST privacy risk to personally identifiable information (PII) when disposing of an office printer or copier?{
7. Which of the following poses the GREATEST privacy risk to personally identifiable information (PII) when disposing of an office printer or copier?{
8. What should be used to determine the risks associated with using Software as a Service (SaaS) for collaboration and email?{
9. The European Union (EU) General Data Protection Regulation (GDPR) requires organizations to implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk. The Data Owner should therefore consider which of the following requirements?{
10. An organization is preparing to achieve General Data Protection Regulation (GDPR) compliance. The Chief Information Security Officer (CISO) is reviewing data protection methods. Which of the following is the BEST data protection method?{
11. The threat modeling identifies a man-in-the-middle (MITM) exposure. Which countermeasure should the information system security officer (ISSO) select to mitigate the risk of a protected health information (PHI) data leak?{
12. Which of the following findings would MOST likely indicate a high risk in a vulnerability assessment report?{
13. During which phase of a criminal legal proceeding does the lack of a formal data destruction policy have the MOST impact?{
14. A large manufacturing organization arranges to buy an industrial machine system to produce a new line of products. The system includes software provided to the vendor by a third-party organization. The financial risk to the manufacturing organization starting production is high. What step should the manufacturing organization take to minimize its financial risk in the new venture prior to the purchase?{
15. A recent information security risk assessment identified weak system access controls on mobile devices as a high risk. To address this and ensure only authorized staff access company information, which of the following should the organization implement?{
16. A recent information security risk assessment identified weak system access controls on mobile devices as a high risk. In order to address this risk and ensure only authorized staff access company information, which of the following should the organization implement?{
17. To mitigate the risk of unauthorized access to a cloud-based Identity and Access Management (IAM) service provider, what is the BEST solution?{
18. What is the MOST effective way to protect privacy?{

 

Chat WhatsApp
+971501254773