A Chief Information Security Officer (CISO) needs to create a policy set that meets international standards for data privacy and sharing. Which of the following should the CISO read and understand before writing the policies?
Correct Answer:B
A company needs to centralize its logs to create a baseline and have visibility on its security events. Which of the following technologies will accomplish this objective?
Correct Answer:A
A network administrator has been asked to install an IDS to improve the security posture of an organization. Which of the following control types is an IDS?
Correct Answer:C
A user enters a password to log in to a workstation and is then prompted to enter an authentication code. Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO).
Correct Answer:BE
Which of the following BEST explains the difference between a data owner and a data custodian?
Correct Answer:B
Several large orders of merchandise were recently purchased on an e-commerce company's website. The totals for each of the transactions were negative values, resulting in credits on the customers'
accounts. Which of the following should be implemented to prevent similar situations in the future?
Correct Answer:A