- (Exam Topic 2)
Which of the following is a fundamental component of an audit record?
Correct Answer:
A
- (Exam Topic 5)
Which regulation or policy governs protection of personally identifiable user data gathered during a cyber investigation?
Correct Answer:
B
- (Exam Topic 5)
Scenario: Your company has many encrypted telecommunications links for their world-wide operations. Physically distributing symmetric keys to all locations has proven to be administratively burdensome, but symmetric keys are preferred to other alternatives.
Symmetric encryption in general is preferable to asymmetric encryption when:
Correct Answer:
C
- (Exam Topic 2)
In MOST organizations which group periodically reviews network intrusion detection system logs for all systems as part of their daily tasks?
Correct Answer:
C
- (Exam Topic 1)
When briefing senior management on the creation of a governance process, the MOST important aspect should be:
Correct Answer:
D