Topic 1: Exam Pool A
Which of the following information BEST supports risk management decision making?
A.
Average cost of risk events
B.
Results of a vulnerability assessment
C.
Estimated savings resulting from reduced risk exposure
D.
Quantification of threats through threat modeling
Estimated savings resulting from reduced risk exposure
Which of the following roles is BEST suited to validate user access requirements during an
annual user access review?
A.
System administrator
B.
Access manager
C.
Business owner
D.
IT director
Business owner
Which of the following is the PRIMARY responsibility of an information security steering
committee composed of management representation from business units?
A.
Perform business impact analyses (BIAS).
B.
Monitor the treatment of information security risk.
C.
Oversee the execution of the information security strategy
D.
Manage the implementation of the information security plan.
Oversee the execution of the information security strategy
Which of the following is the MOST important security feature an information security
manager would need for a mobile device management (MDM) program?
A.
Ability to inventory devices
B.
Ability to remotely wipe devices
C.
Ability to locate devices
D.
Ability to push updates to devices
Ability to inventory devices
The MAIN purpose of documenting information security guidelines for use within a large,
international organization is to:
A.
explain the organization's preferred practices for security
B.
ensure that all business units have the same strategic security goals
C.
ensure that all business units implement identical security procedures
D.
provide evidence for auditors that security practices are adequate
explain the organization's preferred practices for security
Page 17 out of 61 Pages |
Previous |