1. For an organization with operations in different parts of the world, the BEST approach for ensuring that security policies do not conflict with local laws and regulations is to:
A) refer to an external global standard to avoid any regional conflict B) make policies at a sufficiently high level, so they are globally applicable C) adopt uniform policies D) establish a hierarchy of global and local policies
2. Threat and vulnerability assessments are important PRIMARILY because they are:
A) needed to estimate risk B) the basis for setting control objectives C) elements of the organization's security posture D) used to establish security investments
3. Which of the following is the PRIMARY goal of business continuity management?
A) Establish incident response procedures. B) Assess the impact to business processes. C) Increase survivability of the organization. D) Implement controls to prevent disaster.
4. Which of the following should an information security manager establish FIRST to ensure security-related activities are adequately monitored?
A) Internal reporting channels B) Accountability for security functions C) Scheduled security assessments D) Regular reviews of computer system logs
5. Which of the following should be done FIRST when establishing security measures for personal data stored and processed on a human resources management system?
A) Conduct a privacy impact assessment. B) Evaluate data encryption technologies. C) Move the system into a separate network. D) Conduct a vulnerability assessment.
Leave a comment