Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

According to best practice, at which step in the system lifecycle shall a security professional begin involvement?

A.

Project initiation and planning

B.

Functional requirements and definition

C.

System design specification

D.

Build and document

An organization has been struggling to improve their security posture after a recent breach. Where should the organization focus their efforts?

A.

Business Continuity Plan (BCP)

B.

Service-Level Agreements (SLA)

C.

Common configuration enumerations

D.

National vulnerabilities database

What activity is a useful element in the change process?

A.

Creating short-term wins

B.

Calculating a break-even point

C.

Performing a SWOT analysis

D.

Developing key performance indicators (KPIs)

An executive wants to ensure that risk related to information operations is managed in accordance with the enterprise's risk management thresholds. What is the BEST way to ensure this consistently occurs?

A.

Publish and enforce enterprise policies that assign risk decisions to corporate officers.

B.

Publish and enforce enterprise policies that assign risk decisions to cybersecurity analysts.

C.

Publish and enforce enterprise policies that assign risk decisions to business unit managers.

D.

Publish and enforce enterprise policies that assign risk decisions to system administrators.

What does the Role-Based Access Control (RBAC) method define?

A.

What equipment is needed to perform

B.

How information is accessed within a system

C.

What actions the user can or cannot do

D.

How to apply the security labels in a system

Which of the following trade-offs should be evaluated when determining where to place inventory in a multi-echelon supply chain network?

A.

Production cost and lot size quantity

B.

Purchase cost and shrinkage rates

C.

Transportation cost and delivery time

D.

Customer price and order quantity

An organization is running a cloud-based application to process the information obtained at point-of-sale devices. Which guideline should be applied to the application?

A.

Health Insurance Portability And Accountability Act (HIPAA)

B.

Application Security Verification Standard (ASVS)

C.

Payment Card Industry Data Security Standard (PCI DSS)

D.

Gramm-Leach-Bliley Act (GLBA)

Maintaining software asset security is MOST dependent on what information?

A.

Software licensing

B.

Asset ownership

C.

Inventory of software

D.

Classification level

An organization is aiming to be System and Organization Controls (SOC) 2 certified by an audit organization to demonstrate its security and availability maturity to its sub service organizations. Which type of audit does this engagement BEST describe?

A.

Forensic audit

B.

Third-party audit

C.

Location audit

D.

Internal audit

Which of the following should be performed FIRST in the course of a digital forensics investigation?

A.

Undelete files and investigate their content.

B.

Search through unallocated space.

C.

Shut down the system.

D.

Identify any data that needs to be obtained.

In preparing for a facility location decision, proximity to suppliers would be classified as which kind of criteria?

A.

Service level requirements

B.

Future flexibility factors

C.

Access to transportation

D.

Cost factors

Which protocol is the BEST option to provide authentication, confidentiality, and data integrity between two applications?

A.

File Transfer Protocol (FTP)

B.

Security Assertion Markup Language (SAML)

C.

Peer-To-Peer (P2P) communication

D.

Transport Layer Security (TLS)

After reviewing the output of a threat modelling workshop, the development manager decides not to implement the application features where issues were identified. What is the BEST description of how the threats from the workshop are being addressed?

A.

Eliminated

B.

Mitigated

C.

Transferred

D.

Accepted

Which of the following methods places a replenishment order when the quantity on hand falls below a predetermined level?

A.

Min-max system

B.

Fixed order quantity

C.

Periodic review

D.

Available-to-promlse (ATP)

Which of the following is a system architecture in a data protection strategy?

A.

Logical isolation

B.

Network segmentation

C.

Distributed network

D.

Access enforcement