Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

You are assessing your organization's Disaster Recovery and Business Continuity (BR/BCP) requirements based on the shift to remote work. Which statement is LEAST reflective of current practices in business resiliency?

A.

Third party service providers should be included in the company’s exercise and testing program based on the criticality of the outsourced business function

B.

The right to require participation in testing with third party service providers should be included in the contract

C.

The contract is the only enforceable control to stipulate third party service provider obligations for DR/BCP since both programs were triggered by the pandemic

D.

Management should request and receive artifacts that Gemonstrate successful test results and any remediation action plans

You are updating program requirements due to shift in use of technologies by vendors to enable hybrid work. Which statement is LEAST likely to represent components of an Asset

Management Program?

A.

Asset inventories should include connections to external parties, networks, or systems that process data

B.

Each asset should include an organizational owner who is responsible for the asset throughout its life cycle

C.

Assets should be classified based on criticality or data sensitivity

D.

Asset inventories should track the flow or distribution of items used to fulfill products and Services across production lines

Which of the following data types would be classified as low risk data?

A.

Sanitized customer data used for aggregated profiling

B.

Non personally identifiable, but sensitive to an organizations significant process

C.

Government-issued number, credit card number or bank account information

D.

Personally identifiable data but stored in a test environment cloud container

Which of the following statements is FALSE about Data Loss Prevention Programs?

A.

DLP programs include the policy, tool configuration requirements, and processes for the identification, blocking or monitoring of data

B.

DLP programs define the consequences for non-compliance to policies

C.

DLP programs define the required policies based on default tool configuration

D.

DLP programs include acknowledgement the company can apply controls to remove any data

A set of principles for software development that address the top application security risks and industry web requirements is known as:

A.

Application security design standards

B.

Security testing methodology

C.

Secure code reviews

D.

Secure architecture risk analysis

Which cloud deployment model is primarily focused on the application layer?

A.

Infrastructure as a Service

B.

Software as a Service

C.

Function a3 a Service

D.

Platform as a Service

Which of the following BEST reflects components of an environmental controls testing program?

A.

Scheduling testing of building access and intrusion systems

B.

Remote monitoring of HVAC, Smoke, Fire, Water or Power

C.

Auditing the CCTV backup process and card-key access process

D.

Conducting periodic reviews of personnel access controls and building intrusion systems

Which statement BEST describes the methods of performing due diligence during third party risk assessments?

A.

Inspecting physical and environmental security controls by conducting a facility tour

B.

Reviewing status of findings from the questionnaire and defining remediation plans

C.

interviewing subject matter experts or control owners, reviewing compliance artifacts, and validating controls

D.

Reviewing and assessing only the obligations that are specifically defined in the contract

Which activity reflects the concept of vendor management?

A.

Managing service level agreements

B.

Scanning and collecting information from third party web sites

C.

Reviewing and analyzing external audit reports

D.

Receiving and analyzing a vendor's response to & questionnaire

Which of the following components are typically NOT part of a cloud hosting vendor assessment program?

A.

Reviewing the entity's image snapshot approval and management process

B.

Requiring security services documentation and audit attestation reports

C.

Requiring compliance evidence that provides the definition of patching responsibilities

D.

Conducting customer performed penetration tests