Which of the following defines the intent of a system security policy?
Which statement is MOST accurate in the majority of organizational...
What law provides intellectual property protection to the holders of...
Which one of the following categories of organizations is most likely...
Beth is the security administrator for a public school district. She...
Users in the two offices would like to access each other's file...
HAL Systems recently decided to stop offering public NTP services...
Who is the ideal person to approve an organization's business...
Every year, Gary receives privacy notices in the mail from financial...
80. Ben is responsible for the security of payment card information...
Which one of the following is the first step in developing an...
Which one of the following security programs is designed to establish...
Henry is the risk manager for Atwood Landing, a resort community in...
A compensating control is _____
51. Which one of the following is not normally included in business...
Which one of the following is not normally considered a business...
James is conducting a risk assessment for his organization and is...
Which one of the following is not a requirement for an invention to be...
90. Which one of the following tools is most often used for...
If a company has no written policy notifying employees of its right to...
What are the rights and obligations of individuals and organizations...
Which of the following is LEAST likely to be required to quantify the...
Which of the following best defines a Business Impact Analysis (BIA)?
Governance involves ______
What is essential to get from an employee or contractor when they...
Match the following numbered wireless attack terms with their...
Under the Digital Millennium Copyright Act (DMCA), what type of...
Which one of the following is not one of the three common threat...
Which one of the following elements of information is not considered...
You are completing your business continuity planning effort and have...
Tony is developing a business continuity plan and is having difficulty...
Which one of the following principles imposes a standard of care upon...
When developing a business impact analysis, the team should first...
Mike recently implemented an intrusion prevention system designed to...
The International Information Systems Security Certification...
32. What government agency is responsible for the evaluation and...
Which one of the following individuals is normally responsible for...
Florian receives a flyer from a federal agency announcing that a new...
The following graphic shows the NIST risk management framework with...
Ben is seeking a control objective framework that is widely accepted...
Which one of the following stakeholders is not typically included on a...
The Domer Industries risk assessment team recently conducted a...
Rolando is a risk manager with a large-scale enterprise. The firm...
Helen is the owner of a website that provides information for middle...
Which one do you like?
Which one of the following security programs is designed to provide...
John is analyzing an attack against his company in which the attacker...
100. Which one of the following is an administrative control that can...
STRIDE, PASTA, and VAST are all examples of what type of tool?
Which of the following is a realistic goal of every loss prevention...
Which is the FIRST step that should be considered in a penetration...
Under the principle of negligence, executives can be held liable for...
The organizational information security plan can
Which of these is the MOST important factor when considering the...
Which of these Intellectual Property Law concepts is NOT a part of...
In order to determine whether encrypted messages can be sent between...
Which of these is one of the Organization for Economic Cooperation and...
In risk analysis calculations, which of these statements is correct?
Which of these statements is MOST likely to trigger a change in...
Which one of the following actions might be taken as part of a...
Alan works for an e-commerce company that recently had some content...
Which one of the following is not a goal of a formal change management...
Tom is planning to terminate an employee this afternoon for fraud and...
Craig is selecting the site for a new data center and must choose a...
Henry is the risk manager for Atwood Landing, a resort community in...
An information security policy does NOT usually include:
A newly assigned Risk Manager requests access to a file share...
Which of the following would BEST help an organization to gain a...
When conducting the business impact assessment, business processes are...
An organizational information security strategy is incomplete without
Which of these terms is MOST closely related to confidentiality?
Which of these deals with international copyright agreements?
What is the final step of a quantitative risk analysis?
In 1991, the Federal Sentencing Guidelines formalized a rule that...
What United States government agency is responsible for administering...
Yolanda is the chief privacy officer for a financial institution and...
Tim's organization recently received a contract to conduct sponsored...
Darcy is designing a fault tolerant system and wants to implement RAID...
Keenan Systems recently developed a new manufacturing process for...
Which one of the following is an example of physical infrastructure...
Which one of the following is normally used as an authorization tool?
Mary is helping a computer user who sees the following message appear...
Which one of the following organizations would not be automatically...
31. Renee is designing the long-term security plan for her...
Robert is responsible for securing systems used to process credit card...
Tom enables an application firewall provided by his cloud...
Which one of the following individuals would be the most effective...
What important function do senior managers normally fill on a business...
You are the CISO for a major hospital system and are preparing to sign...
Which one of the following issues is not normally addressed in a...
You are also concerned about the availability of data stored on each...
Finally, there are historical records stored on the server that are...
What law serves as the basis for privacy rights in the United States?
An accounting employee at Doolittle Industries was recently arrested...
Who should receive initial business continuity plan training in an...
The Computer Security Act of 1987 gave a federal agency responsibility...
Frank discovers a keylogger hidden on the laptop of his company's...
What is the formula used to determine risk?
Susan is working with the management team in her company to classify...
Which one of the following components should be included in an...
Gary is implementing a new website architecture that uses multiple...
Becka recently signed a contract with an alternate data processing...
70. What is the threshold for malicious damage to a federal computer...
Which one of the following laws requires that communications service...
Which one of the following agreements typically requires that a vendor...
Which one of the following is not an example of a technical control?
Tom is considering locating a business in the downtown area of Miami,...
Alan is performing threat modeling and decides that it would be useful...
Which type of business impact assessment tool is most appropriate when...
95. Ryan is a security risk analyst for an insurance company. He is...
After completing the first year of his security awareness program,...
105. Which of the following is not typically included in a prehire...
Greg's company recently experienced a significant data breach...
Lawrence has been asked to perform vulnerability scans and a risk...
110. Laura has been asked to perform an SCA. What type of organization...
One purpose of a security awareness program is to modify
Which of the following assures alignment of security functions and the...
The concept of "least privilege" involves:
Which of these is NOT an example of social engineering?
Copyright protects ______
As an employee of an investment bank, you have just completed...
Which one of the following provides an authentication mechanism that...
Chris is advising travelers from his organization who will be visiting...
Bobbi is investigating a security incident and discovers that an...
54. Which information security goal is impacted when an organization...
Yolanda is writing a document that will provide configuration...
Which one of the following actions is not normally part of the project...
What principle of information security states that an organization...
Which of the following is not typically part of a termination process?
After conducting a qualitative risk assessment of her organization,...
Which of the following MOST clearly indicates whether specific risk...
When is it acceptable for management not to take action on an...
Under which one of the following situations would a trash can fire be...
Which of the following definitions is correct?
A laptop with a medical database contains records of device sales,...
Closed-circuit camera feeds and recordings are commonly used as all of...
FlyAway Travel has offices in both the European Union (EU) and the...
Which one of the following control categories does not accurately...
Which one of the following is an example of an administrative control?
John's network begins to experience symptoms of slowness. Upon...
The Acme Widgets Company is putting new controls in place for its...
Gary is analyzing a security incident and, during his investigation,...
Joan is seeking to protect a piece of computer software that she...
Ben is designing a messaging system for a bank and would like to...
Match the following numbered laws or industry standards to their...
In her role as a developer for an online bank, Lisa is required to...
The (ISC)2 code of ethics applies to all CISSP holders. Which of the...