1. Ensuring that activities performed by outsourcing providers comply with information security policies can BEST be accomplished through the use of:
A) service level agreements. B) independent audits. C) explicit contract language. D) local regulations.
2. Which of the following will BEST enable an effective information asset classification process?
A) Reviewing the recovery time objective (RTO) requirements of the asset B) Analyzing audit findings C) Including security requirements in the classification process D) Assigning ownership
3. Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?
A) Proxy server B) Mail relay server C) Application server D) Database server
4. Which of the following should be the MOST important criteria when defining data retention policies?
A) Capacity requirements B) Audit findings C) Regulatory requirements D) Industry best practices
5. Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of integrity?
A) Enforcing service level agreements B) Implementing a data classification schema C) Ensuring encryption for data in transit D) Utilizing a formal change management process
Leave a comment