Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which cloud deployment model is focused on the management of hardware equipment?

A.

Function as a service

B.

Platform as a service

C.

Software as a service

D.

Infrastructure as a service

Which of the following components is NOT typically included in external continuous monitoring solutions?

A.

Status updates on localized events based on geolocation

B.

Alerts on legal and regulatory actions involving the vendor

C.

Metrics that track SLAs for performance management

D.

Reports that identify changes in vendor financial viability

Which statement BEST describes the use of risk based decisioning in prioritizing gaps identified at a critical vendor when defining the corrective action plan?

A.

The assessor determined that gaps should be analyzed, documented, reviewed for compensating controls, and submitted to the business owner to approve risk treatment plan

B.

The assessor decided that the critical gaps should be discussed in the closing meeting so that the vendor can begin to implement corrective actions immediately

C.

The assessor concluded that all gaps should be logged and treated as high severity findings since the assessment was performed on a critical vendor

D.

The assessor determined that all gaps should be logged and communicated that if the gaps were corrected immediately they would not need to be included in the findings report

Which of the following would be a component of an arganization’s Ethics and Code of Conduct Program?

A.

Participation in the company's annual privacy awareness program

B.

A disciplinary process for non-compliance with key policies, including formal termination or change of status process based on non-compliance

C.

Signing acknowledgement of Acceptable Use policy for use of company assets

D.

A process to conduct periodic access reviews of critical Human Resource files

If a system requires ALL of the following for accessing its data: (1) a password, (2) a

security token, and (3) a user's fingerprint, the system employs:

A.

Biometric authentication

B.

Challenge/Response authentication

C.

One-Time Password (OTP) authentication

D.

Multi-factor authentication

Which statement is FALSE when describing the differences between security vulnerabilities and security defects?

A.

A security defect is a security flaw identified in an application due to poor coding practices

B.

Security defects should be treated as exploitable vulnerabilities

C.

Security vulnerabilities and security defects are synonymous

D.

A security defect can become a security vulnerability if undetected after migration into production

You receive a call from a vendor that two laptops and a tablet are missing that were used to process your company data. The asset loss occurred two years ago, but was only recently discovered. That statement may indicate that this vendor is lacking an adequate:

A.

Asset Management Program

B.

Physical and Environmental Security Program

C.

Data Loss Prevention Program

D.

Information Security Incident Notification Policy

Which factor is less important when reviewing application risk for application service providers?

A.

Remote connectivity

B.

The number of software releases

C.

The functionality and type of data the application processes

D.

APl integration

When evaluating remote access risk, which of the following is LEAST applicable to your analysis?

A.

Logging of remote access authentication attempts

B.

Limiting access by job role of business justification

C.

Monitoring device activity usage volumes

D.

Requiring application whitelisting

When evaluating compliance artifacts for change management, a robust process should include the following attributes:

A.

Approval, validation, auditable.

B.

Logging, approvals, validation, back-out and exception procedures

C.

Logging, approval, back-out.

D.

Communications, approval, auditable.