- (Topic 3)
A CISO sees abnormally high volumes of exceptions to security requirements and constant pressure from business units to change security processes. Which of the following represents the MOST LIKELY cause of this situation?
Correct Answer:
C
- (Topic 3)
A newly appointed security officer finds data leakage software licenses that had never been used. The officer decides to implement a project to ensure it gets installed, but the project gets a great deal of resistance across the organization. Which of the following represents the MOST likely reason for this situation?
Correct Answer:
B
- (Topic 4)
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks 2.Scanning and enumeration 3.Maintaining Access 4.Reconnaissance
5.Gaining Access
Correct Answer:
A
- (Topic 3)
When is an application security development project complete?
Correct Answer:
A
- (Topic 1)
A security manager has created a risk program. Which of the following is a critical part of ensuring the program is successful?
Correct Answer:
A