1.
What is the relationship between information protection and regulatory compliance?
2.
Who in the organization determines access to information?
3.
When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?
4.
The FIRST step in establishing a security governance program is to?
5.
When an organization claims it is secure because it is PCI-DSS certified, what is a good first question to ask towards assessing the effectiveness of their security program?
6.
A security manager has created a risk program. Which of the following is a critical part of ensuring the program is successful?
7.
Ensuring that the actions of a set of people, applications and systems follow the organizations rules is BEST described as:
8.
Which of the following international standards can be BEST used to define a Risk Management process in an organization?
9.
 A security professional has been promoted to be the CISO of an organization. The first task is to create a security policy for this organization. The CISO creates and publishes the security policy. This policy however, is ignored and not enforced consistently. Which of the following is the MOST likely reason for the policy shortcomings?
10.
Regulatory requirements typically force organizations to implement ____________.