Remote sensors have been deployed at a utility site to reduce overall response times for maintenance staff supporting critical infrastructure. Wireless communications are used to communicate with the remote sensors, as it is the most cost-effective method and minimizes risk to public health and safety. The utility organization has deployed a Host-Based Intrusion Prevention System (HIPS) to monitor and protect the sensors. Which statement BEST describes the risk that is mitigated by utilizing this security tool?
An organization’s computer incident response team PRIMARILY responds to which type of control?
When implementing a data classification program, Which is MOST important for measuring businesss impact?
A company confirms a customer order based on available capacity and inventory, even though the current production plan does not cover the entire order quantity. This situation is an example of what type of order fulfillment policy?
Which of the following ports needs to be open for Kerberos Key Distribution Center (KDC) to function properly?
When resolving conflicts, which canon within the ISC2 Code of Ethics requires members to consider duties to principals and Individuals?
During the sales and operations planning (S&OP) process, which of the following tasks is the primary responsibility of the functional representatives on the supply planning team?
An organizations is developing a new software package for a financial institution. What is the FIRST step when modeling threats to this new software package?
An information security auditor is creating an audit program to assess endpoint security controls for portable storage media movement. Which type of control will MOST likely be part of the program?
A United States (US)-based online gaming provider, which operates in Germany, collects and uses a large amount of user behavioral data. A customer from Germany requests a copy of all their personal data.
What is the MOST appropriate course of action for the organization to take?
Which approach will BEST mitigate risks associated with root user access while maintaining system functionality?
Which of the following techniques is BEST suited to preserve the confidentiality of a system’s data?
A company's primary performance objective Is flexibility. Which of the following measurements is most important?
Information regarding a major new customer is received from sales. The company's most appropriate initial response would be to adjust the:
Price negotiation is most appropriate when purchasing which of the following product categories?