A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:
C
Explanation:
Reference:
https://www.securew2.com/blog/piv-personal-identity-verification
Which of the following would negatively impact a log analysis of a multinational organization?
D
Which regulation or policy governs protection of personally identifiable user data gathered during a
cyber investigation?
B
What are the three hierarchically related aspects of strategic planning and in which order should they
be done?
D
As the Business Continuity Coordinator of a financial services organization, you are responsible for
ensuring assets are recovered timely in the event of a disaster. Which is the BEST Disaster Recovery
performance indicator to validate that you are prepared for a disaster?
D
Explanation:
Reference:
https://www.resolver.com/resource/bcdr-metrics-that-matter/
What process defines the framework of rules and practices by which a board of directors ensure
accountability, fairness and transparency in an organization's relationship with its shareholders?
B
Explanation:
Reference:
https://www.igi-global.com/dictionary/corporate-governance/5957
Which technology can provide a computing environment without requiring a dedicated hardware
backend?
B
Which of the following information would MOST likely be reported at the board-level within an
organization?
C
What is the difference between encryption and tokenization?
B
Explanation:
Reference:
http://library.ahima.org/doc?oid=104090#.X_dwWolR3eQ
A CISO wants to change the defense strategy to ward off attackers. To accomplish this the CISO is
looking to a strategy where attackers are lured into a zone of a safe network where attackers can be
monitored, controlled, quarantined, or eradicated.
D