1.
Which of the following intellectual Property components is focused on maintaining brand recognition?
2.
Credit card information, medical data, and government records are all examples of:
3.
You have implemented a new security control. Which of the following risk strategy options have you engaged in?
4.
What is a difference from the list below between quantitative and qualitative Risk Assessment?
5.
You have purchased a new insurance policy as part of your risk strategy. Which of the following risk strategy options have you engaged in?
6.
What is the definition of Risk in Information Security?
7.
A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should the information security manager take?
8.
Dataflow diagrams are used by IT auditors to:
9.
When measuring the effectiveness of an Information Security Management System which one of the following would be MOST LIKELY used as a metric framework?
10.
The purpose of NIST SP 800-53 as part of the NIST System Certification and Accreditation Project is to establish a set of standardized, minimum security controls for IT systems addressing low, moderate, and high levels of concern for: