- (Exam Topic 1)
If your organization operates under a model of "assumption of breach", you should:
Correct Answer:
C
- (Exam Topic 1)
Within an organization’s vulnerability management program, who has the responsibility to implement remediation actions?
Correct Answer:
D
- (Exam Topic 5)
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
Recently, members of your organization have been targeted through a number of sophisticated phishing attempts and have compromised their system credentials. What action can you take to prevent the misuse of compromised credentials to change bank account information from outside your organization while still allowing employees to manage their bank information?
Correct Answer:
D
- (Exam Topic 1)
You have recently drafted a revised information security policy. From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?
Correct Answer:
B
- (Exam Topic 6)
Which of the following statements below regarding Key Performance indicators (KPIs) are true?
Correct Answer:
A
Reference: https://kpi.org/KPI-Basics/KPI-Development