Which of the following is MOST important when assigning ownership of an asset to a department?
Which of the following BEST describes the responsibilities of a data owner?
Which of the following is an effective control in preventing electronic cloning of Radio Frequency Identification (RFID) based access cards?
When implementing a data classification program, why is it important to avoid too much granularity?
In a data classification scheme, the data is owned by the
The goal of a Business Impact Analysis (BIA) is to determine which of the following?
What is one way to mitigate the risk of security flaws in custom software?
Which of the following is the MOST important element of change management documentation?
Discretionary Access Control (DAC) restricts access according to
Which of the following is the MAIN reason for using configuration management?
While investigating a malicious event, only six days of audit logs from the last month were available. What policy should be updated to address this problem?
Which of the following disaster recovery test plans will be MOST effective while providing minimal risk?
What security risk does the role-based access approach mitigate MOST effectively?
Which of the following BEST describes a chosen plaintext attack?
The PRIMARY characteristic of a Distributed Denial of Service (DDoS) attack is that it