Question 43

- (Topic 1)
Which of the following is considered the MOST effective tool against social engineering?

Correct Answer:D

Question 44

- (Topic 1)
What role should the CISO play in properly scoping a PCI environment?

Correct Answer::C

Question 45

- (Topic 1)
A security manager has created a risk program. Which of the following is a critical part of ensuring the program is successful?

Correct Answer:A

Question 46

- (Topic 3)
An example of professional unethical behavior is:

Correct Answer:C

Question 47

- (Topic 5)
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
Once supervisors and data owners have approved requests, information system administrators will implement

Correct Answer:A

Question 48

- (Topic 1)
The alerting, monitoring and life-cycle management of security related events is typically handled by the

Correct Answer::A

START 712-50 EXAM