Topic 1: Governance (Policy, Legal & Compliance)
Regulatory requirements typically force organizations to implement
A.
Mandatory controls
B.
Discretionary controls
C.
Optional controls
D.
Financial controls
Mandatory controls
What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?
A.
Determine appetite
B.
Evaluate risk avoidance criteria
C.
Perform a risk assessment
D.
Mitigate risk
Mitigate risk
Which of the following is a critical operational component of an Incident Response Program (IRP)?
A.
Weekly program budget reviews to ensure the percentage of program funding remains constant.
B.
Annual review of program charters, policies, procedures and organizational agreements.
C.
Daily monitoring of vulnerability advisories relating to your organization’s deployed technologies.
D.
Monthly program tests to ensure resource allocation is sufficient for supporting the needs of the organization
Daily monitoring of vulnerability advisories relating to your organization’s deployed technologies.
When creating a vulnerability scan schedule, who is the MOST critical person to communicate with in order to ensure impact of the scan is minimized?
A.
The asset owner
B.
The asset manager
C.
The data custodian
D.
The project manager
The asset owner
When an organization claims it is secure because it is PCI-DSS certified, what is a good first question to ask towards assessing the effectiveness of their security program?
A.
How many credit card records are stored?
B.
How many servers do you have?
C.
What is the scope of the certification?
D.
What is the value of the assets at risk?
What is the scope of the certification?
Page 5 out of 89 Pages |
Previous |