Which of the following BEST describes the responsibilities of a data owner?
Answer : C
Reference:
http://resources.infosecinstitute.com/category/certifications-training/cissp/domains/asset-security/data-and-system-ownership/#gref
An organization has doubled in size due to a rapid market share increase. The size of the Information Technology (IT) staff has maintained pace with this growth.
The organization hires several contractors whose onsite time is limited. The IT department has pushed its limits building servers and rolling out workstations and has a backlog of account management requests.
Which contract is BEST in offloading the task from the IT staff?
Answer : B
When implementing a data classification program, why is it important to avoid too much granularity?
Answer : A
Reference:
http://www.ittoday.info/AIMS/DSM/82-02-55.pdf
In a data classification scheme, the data is owned by the
Answer : B
Which of the following is an initial consideration when developing an information security management system?
Answer : B
Which of the following is an effective control in preventing electronic cloning of Radio Frequency Identification (RFID) based access cards?
Answer : D
Which factors MUST be considered when classifying information and supporting assets for risk management, legal discovery, and compliance?
Answer : A
When network management is outsourced to third parties, which of the following is the MOST effective method of protecting critical data assets?
Answer : D
Which of the following is the MOST appropriate action when reusing media that contains sensitive data?
Answer : B
An organization recently conducted a review of the security of its network applications. One of the vulnerabilities found was that the session key used in encrypting sensitive information to a third party server had been hard-coded in the client and server applications. Which of the following would be MOST effective in mitigating this vulnerability?
Answer : A
Which of the following methods of suppressing a fire is environmentally friendly and the MOST appropriate for a data center?
Answer : A
Unused space in a disk cluster is important in media analysis because it may contain which of the following?
Answer : A
A company seizes a mobile device suspected of being used in committing fraud. What would be the BEST method used by a forensic examiner to isolate the powered-on device from the network and preserve the evidence?
Answer : A
Which of the following is MOST appropriate for protecting confidentially of data stored on a hard drive?
Answer : B
Which of the following is the MOST effective method to mitigate Cross-Site Scripting (XSS) attacks?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us