Question 73

A Chief Information Security Officer (CISO) needs to create a policy set that meets international standards for data privacy and sharing. Which of the following should the CISO read and understand before writing the policies?

Correct Answer:B

Question 74

A company needs to centralize its logs to create a baseline and have visibility on its security events. Which of the following technologies will accomplish this objective?

Correct Answer:A

Question 75

A network administrator has been asked to install an IDS to improve the security posture of an organization. Which of the following control types is an IDS?

Correct Answer:C

Question 76

A user enters a password to log in to a workstation and is then prompted to enter an authentication code. Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO).

Correct Answer:BE

Question 77

Which of the following BEST explains the difference between a data owner and a data custodian?

Correct Answer:B

Question 78

Several large orders of merchandise were recently purchased on an e-commerce company's website. The totals for each of the transactions were negative values, resulting in credits on the customers'
accounts. Which of the following should be implemented to prevent similar situations in the future?

Correct Answer:A

START SY0-601 EXAM