Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is the purpose of separation of duties?

A.

Internal control to prevent fraud

B.

Enhance exposure to functional areas

C.

Encourage collaboration

D.

Mitigate collusion and prevent theft

Assume that a DDoS attack has been occurring for 72 minutes. What determines who talks to external

stakeholders?

A.

Business Continuity Plan

B.

Communication Plan

C.

Business Impact Analysis

D.

Incident Response Plan

An incident has occurred. You restore backups onto mission/business critical assets. After restoration of the

backups your services are still inaccessible on numerous assets.

What could be the cause of the issue?

A.

Unverified backups

B.

Incorrect backup strategy

C.

Hardware failure

D.

Network failure

What is the primary objective of establishing governance and risk management processes for an organization?

A.

Manage assets effectively in accordance with local laws

B.

Minimize cybersecurity risks in conjunction with compliance processes

C.

Determine compliance controls in accordance with national laws

D.

Establish recovery time objectives for critical infrastructure

What is concerned with availability, reliability, and recoverability of business processes and functions?

A.

Business Impact Analysis

B.

Business Continuity Plan

C.

Recovery Strategy

D.

Disaster Recovery Plan

A CISO is looking for a solution to lower costs, enhance overall efficiency, and improve the reliability of

monitoring security related information.

Which ISCM feature is recommended?

A.

Reporting

B.

Provisioning

C.

Automation

D.

Collection

What determines the technical controls used to restrict access to USB devices and help prevent their use

within a company?

A.

Block use of the USB devices for all employees

B.

Written security policy prohibiting the use of the USB devices

C.

Acceptable use policy in the employee HR on-boarding training

D.

Detect use of the USB devices and report users

What type of system processes information, the loss of which would have a debilitating impact to an

organization?

A.

Mission critical

B.

Security critical

C.

Business critical

D.

Safety critical

What supports an organization in making risk management decisions to address their security posture in real time?

A.

Baseline reporting

B.

Continuous monitoring

C.

User access reviews

D.

Video surveillance

Which category addresses the detection of unauthorized code in software?

A.

PR.DS

B.

DE.DP

C.

PR.AT

D.

DE.CM