1. When developing a disaster recovery plan, which of the following would be MOST helpful in prioritizing the order in which systems should be recovered?
A) Performing a business impact analysis B) Measuring the volume of data in each system C) Reviewing the information security policy D) Reviewing the business strategy
2. When developing an information security strategy, the MOST important requirement is that:
A) standards capture the intent of management. B) a schedule is developed to achieve objectives. C) the desired outcome is known. D) critical success factors (CSFs) are developed.
3. Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?
A) Require remote wipe capabilities for devices. B) Enforce passwords and data encryption on the devices. C) Conduct security awareness training. D) Review and update existing security policies.
4. Which of the following should be the PRIMARY consideration when selecting a recovery site?
A) Regulatory requirements B) Recovery time objective C) Geographical location D) Recovery point objective
5. Management has announced the acquisition of a new company. The information security manager of parent company is concerned that conflicting access rights may cause critical information to be exposed during the integration of the two companies.To BEST address this concern, the information security manager should:
A) escalate concern for conflicting access rights to management. B) implement consistent access control standards. C) review access rights as the acquisition integration occurs. D) perform a risk assessment of the access rights.
Leave a comment