Topic 5
Which of the following is the PRIMARY reason that asset classification is vital to an information security program?
C
Topic 5
Which of the following approaches would BEST ensure that data protection controls are embedded into software being
developed?
C
Topic 5
An organization has adopted a backup and recovery strategy that involves copying on-premise virtual machine (VM) images
to a cloud service provider. Which of the following provides the BEST assurance that VMs can be recovered in the event of a
disaster?
B
Topic 5
Which of the following BEST facilitates detection of zero-day exploits?
B
Topic 5
What is the BEST method for securing credit card numbers stored temporarily on a file server prior to transmission to the
downstream system for payment processing?
C
Topic 5
Which of the following is a characteristic of a single mirrored data center used for disaster recovery?
B
Topic 5
What is the BEST control to address SQL injection vulnerabilities?
B
Topic 5
IT disaster recovery time objectives (RTOs) should be based on the:
A
Topic 5
Which of the following security assessment techniques attempts to exploit a systems open ports?
C
Topic 5
A characteristic of a digital signature is that it:
B