- (Topic 1)
Which of the following is considered the MOST effective tool against social engineering?
Correct Answer:D
- (Topic 1)
What role should the CISO play in properly scoping a PCI environment?
Correct Answer::C
- (Topic 1)
A security manager has created a risk program. Which of the following is a critical part of ensuring the program is successful?
Correct Answer:A
- (Topic 3)
An example of professional unethical behavior is:
Correct Answer:C
- (Topic 5)
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
Once supervisors and data owners have approved requests, information system administrators will implement
Correct Answer:A
- (Topic 1)
The alerting, monitoring and life-cycle management of security related events is typically handled by the
Correct Answer::A