- (Topic 5)
Scenario: Your company has many encrypted telecommunications links for their world-wide operations. Physically distributing symmetric keys to all locations has proven to be administratively burdensome, but symmetric keys are preferred to other alternatives.
How can you reduce the administrative burden of distributing symmetric keys for your
employer?
Correct Answer:A
- (Topic 3)
Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?
Correct Answer:A
- (Topic 1)
What is a difference from the list below between quantitative and qualitative Risk Assessment?
Correct Answer:A
- (Topic 3)
How often should the SSAE16 report of your vendors be reviewed?
Correct Answer:C
- (Topic 3)
In effort to save your company money which of the following methods of training results in the lowest cost for the organization?
Correct Answer:D
- (Topic 1)
A Security Operations Centre (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen and the database server was disconnected. Who must be informed of this incident?
Correct Answer:B