لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
To ensure that payroll systems continue on in an event of a hurricane hitting a data center, what would be the FIRS T crucial step an information security manager would take in ensuring business continuity planning?
A. Conducting a qualitative and quantitative risk analysi
B. Assigning value to the asset
C. Weighing the cost of implementing the plan v
D. financial los
E. Conducting a business impact analysis (BIA)
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which of the following would be MOST effective in successfully implementing restrictive password policies?
A. Regular password audits
B. Single sign-on system
C. Security awareness program
D. Penalties for noncompliance
عرض الإجابة
اجابة صحيحة: C
السؤال #3
From an information security perspective, information that no longer supports the main purpose of the business should be:
A. analyzed under the retention polic
B. protected under the information classification polic
C. analyzed under the backup polic
D. protected under the business impact analysis (BIA)
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which of the following will BEST prevent external security attacks?
A. Static IP addressing
B. Network address translation
C. Background checks for temporary employees
D. Securing and analyzing system access logs
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which of the following are the essential ingredients of a business impact analysis (B1A)?
A. Downtime tolerance, resources and criticality
B. Cost of business outages in a year as a factor of the security budget
C. Business continuity testing methodology being deployed
D. Structure of the crisis management team
عرض الإجابة
اجابة صحيحة: B
السؤال #6
In order to highlight to management the importance of network security, the security manager should FIRST:
A. develop a security architectur
B. install a network intrusion detection system (NIDS) and prepare a list of attack
C. develop a network security polic
D. conduct a risk assessmen
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A good privacy statement should include:
A. notification of liability on accuracy of informatio
B. notification that information will be encrypte
C. what the company will do with information it collect
D. a description of the information classification proces
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Which of the following steps in conducting a risk assessment should be performed FIRST?
A. Identity business assets
B. Identify business risks
C. Assess vulnerabilities
D. Evaluate key controls
عرض الإجابة
اجابة صحيحة: D
السؤال #9
The FIRST step in establishing a security governance program is to:
A. conduct a risk assessmen
B. conduct a workshop for all end user
C. prepare a security budge
D. obtain high-level sponsorshi
عرض الإجابة
اجابة صحيحة: D
السؤال #10
An organization is already certified to an international security standard. Which mechanism would BEST help to further align the organization with other data security regulatory requirements as per new business needs?
A. Key performance indicators (KPIs)
B. Business impact analysis (BIA)
C. Gap analysis
D. Technical vulnerability assessment
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Which of the following controls would BEST prevent accidental system shutdown from the console or operations area?
A. Redundant power supplies
B. Protective switch covers
C. Shutdown alarms
D. Biometric readers
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Which of the following is the BEST justification to convince management to invest in an information security program?
A. Cost reduction
B. Compliance with company policies
C. Protection of business assets
D. Increased business value
عرض الإجابة
اجابة صحيحة: B
السؤال #13
What is the BEST technique to determine which security controls to implement with a limited budget?
A. Risk analysis
B. Annualized loss expectancy (ALE) calculations
C. Cost-benefit analysis
D. Impact analysis
عرض الإجابة
اجابة صحيحة: C
السؤال #14
Quantitative risk analysis is MOST appropriate when assessment data:
A. include customer perception
B. contain percentage estimate
C. do not contain specific detail
D. contain subjective informatio
عرض الإجابة
اجابة صحيحة: D
السؤال #15
Acceptable levels of information security risk should be determined by:
A. legal counse
B. security managemen
C. external auditor
D. die steering committe
عرض الإجابة
اجابة صحيحة: D
السؤال #16
Effective IT governance is BEST ensured by:
A. utilizing a bottom-up approac
B. management by the IT departmen
C. referring the matter to the organization's legal departmen
D. utilizing a top-down approac
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: