The ultimate goal of an IT security projects is:
Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.
Which of the following is the reason the CISO has not been able to advance the security agenda in this organization?
When gathering security requirements for an automated business process improvement program, which of the following is MOST important?
What will a CISO analyze if she wants to understand the MOST current financial status of the organization?
What two methods are used to assess risk impact?
Which of the following BEST describes countermeasures that minimize risk?
What is a key policy that should be part of the information security plan?
Which of the following would negatively impact a log analysis of a multinational organization?
Which of the following is used to establish and maintain a framework to provide assurance that information security strategies are aligned with organizational objectives?
Which represents PROPER separation of duties in the corporate environment?
Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY covered by which of the following plans?
Using the Transport Layer Security (TLS) protocol enables a client in a network to be:
Which of the following best describes revenue?
Which of the following best summarizes the primary goal of a security program?
In MOST organizations which group periodically reviews network intrusion detection system logs for all systems as part of their daily tasks?