Question 55

- (Topic 5)
Scenario: Your company has many encrypted telecommunications links for their world-wide operations. Physically distributing symmetric keys to all locations has proven to be administratively burdensome, but symmetric keys are preferred to other alternatives.
How can you reduce the administrative burden of distributing symmetric keys for your
employer?

Correct Answer:A

Question 56

- (Topic 3)
Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?

Correct Answer:A

Question 57

- (Topic 1)
What is a difference from the list below between quantitative and qualitative Risk Assessment?

Correct Answer:A

Question 58

- (Topic 3)
How often should the SSAE16 report of your vendors be reviewed?

Correct Answer:C

Question 59

- (Topic 3)
In effort to save your company money which of the following methods of training results in the lowest cost for the organization?

Correct Answer:D

Question 60

- (Topic 1)
A Security Operations Centre (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen and the database server was disconnected. Who must be informed of this incident?

Correct Answer:B

START 712-50 EXAM