In effort to save your company money which of the following methods of training results in the lowest cost for the organization?
This occurs when the quantity or quality of project deliverables is expanded from the original project plan.
Which of the following best summarizes the primary goal of a security program?
What are the three stages of an identity and access management system?
The newly appointed CISO of an organization is reviewing the IT security strategic plan. Which of the following is the MOST important component of the strategic plan?
Which type of scan is used on the eye to measure the layer of blood vessels?
Which of the following is MOST useful when developing a business case for security initiatives?
Access Control lists (ACLs), Firewalls, and Intrusion Prevention Systems are examples of
The Annualized Loss Expectancy (Before) minus Annualized Loss Expectancy (After) minus Annual Safeguard Cost is the formula for determining:
When dealing with risk, the information security practitioner may choose to:
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
Once supervisors and data owners have approved requests, information system administrators will implement
Which of the following is considered the foundation for the Enterprise Information Security Architecture (EISA)?
The network administrator wants to strengthen physical security in the organization. Specifically, to implement a
solution stopping people from entering certain restricted zones without proper credentials. Which of following
physical security measures should the administrator use?
Scenario: You are the newly hired Chief Information Security Officer for a company that has not previously had a senior level security practitioner. The company lacks a defined security policy and framework for their Information Security Program. Your new boss, the Chief Financial Officer, has asked you to draft an outline of a security policy and recommend an industry/sector neutral information security control framework for implementation.
Your Corporate Information Security Policy should include which of the following?
Which of the following best describes the sensors designed to project and detect a light beam across an area?