When briefing senior management on the creation of a governance process, the MOST important aspect should be:
What is the last step in the system authorization process?
Which of the following provides the BEST approach to achieving positive outcomes while preserving savings?
When performing a forensic investigation, what are the two MOST common sources for obtaining computer evidence?
Which of the following is a PRIMARY purpose of a Security Operations Center (SOC)?
Which of the following is a symmetric encryption algorithm?
The company decides to release the application without remediating the high-risk vulnerabilities. Which of the following is the MOST likely reason for the company to release the application?
What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?
The framework that helps to define a minimum standard of protection that business stakeholders must attempt to achieve is referred to as a standard of:
XYZ is a publicly-traded software development company.
Who is ultimately accountable to the shareholders in the event of a cybersecurity breach?
You have recently drafted a revised information security policy. From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?
What is the PRIMARY guideline when analyzing the cost of a security control versus the cost of the asset?
A Security Operations Centre (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen and the database server was disconnected. Who must be informed of this incident?
A Security Operations (SecOps) Manager is considering implementing threat hunting to be able to make better decisions on protecting information and assets.
What is the MAIN goal of threat hunting to the SecOps Manager?
Which of the following is critical for a successful risk management program?