1.
A Security Operations Centre (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen and the database server was disconnected. Who must be informed of this incident?
2.
An organization has defined a set of standard security controls. This organization has also defined the circumstances and conditions in which they must be applied. What is the NEXT logical step in applying the controls in the organization?
3.
If your organization operates under a model of "assumption of breach", you should:
4.
When dealing with a risk management process, asset classification is important because it will impact the overall:
5.
You have a system with 2 identified risks. You determine the probability of one risk occurring is higher than the
6.
Which of the following is a benefit of information security governance?
7.
Developing effective security controls is a balance between:
8.
The framework that helps to define a minimum standard of protection that business stakeholders must attempt to achieve is referred to as a standard of:
9.
Which of the following is considered the MOST effective tool against social engineering?
10.

When managing the security architecture for your company you must consider: