Which of the following would negatively impact a log analysis of a multinational organization?
A.
Centralized log management
B.
Encrypted log files in transit
C.
Each node set to local time
D.
Log aggregation agent each node
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
Which regulation or policy governs protection of personally identifiable user data gathered during a cyber investigation?
A.
ITIL
B.
Privacy Act
C.
Sarbanes Oxley
D.
PCI-DSS
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
What are the three hierarchically related aspects of strategic planning and in which order should they be done?
A.
1) Information technology strategic planning, 2) Enterprise strategic planning, 3) Cybersecurity or information security strategic planning
B.
1) Cybersecurity or information security strategic planning, 2) Enterprise strategic planning, 3) Information technology strategic planning
C.
1) Enterprise strategic planning, 2) Information technology strategic planning, 3) Cybersecurity or information security strategic planning
D.
1) Enterprise strategic planning, 2) Cybersecurity or information security strategic planning, 3) Information technology strategic planning
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
As the Business Continuity Coordinator of a financial services organization, you are responsible for ensuring assets are recovered timely in the event of a disaster. Which is the BEST Disaster Recovery performance indicator to validate that you are prepared for a disaster?
What process defines the framework of rules and practices by which a board of directors ensure accountability, fairness and transparency in an organization's relationship with its shareholders?
A CISO wants to change the defense strategy to ward off attackers. To accomplish this the CISO is looking to a strategy where attackers are lured into a zone of a safe network where attackers can be monitored, controlled, quarantined, or eradicated.
A.
Moderate investment
B.
Passive monitoring
C.
Integrated security controls
D.
Dynamic deception
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 11
Which of the following is an accurate description of a balance sheet?
A.
The percentage of earnings that are retained by the organization for reinvestment in the business
B.
The details of expenses and revenue over a long period of time
C.
A summarized statement of all assets and liabilities at a specific point in time
D.
A review of regulations and requirements impacting the business from a financial perspective
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 12
Which of the following is used to lure attackers into false environments so they can be monitored, contained, or blocked from reaching critical systems?
A.
Segmentation controls.
B.
Shadow applications.
C.
Deception technology.
D.
Vulnerability management.
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 13
What is one key difference between Capital expenditures and Operating expenditures?
A.
Operating expense cannot be written off while Capital expense can
B.
Operating expenses can be depreciated over time and Capital expenses cannot
C.
Capital expenses cannot include salaries and Operating expenses can
D.
Capital expenditures allow for the cost to be depreciated over time and Operating does not
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 14
As the CISO, you have been tasked with the execution of the companys key management program. You MUST ensure the integrity of encryption keys at the point of generation. Which principal of encryption key control will ensure no single individual can constitute or re-constitute a key?
As the Chief Information Security Officer, you want to ensure data shared securely, especially when shared with third parties outside the organization. What protocol provides the ability to extend the network perimeter with the use of encapsulation and encryption?