1.
A business unit uses an e-commerce application with a strong password policy. Many customers complain that they cannot remember their passwords because they are too long and complex. The business unit states it is imperative to improve the customer experience. The information security manager should FIRST:
2.
Which of the following will BEST help to proactively prevent the exploitation of vulnerabilities in operating system software?
3.
During which phase of an incident response process should corrective actions to the response procedure be considered and implemented?
4.
Employees in a large multinational organization frequently travel among various geographic locations. Which type of authorization policy BEST addresses this practice?
5.
To ensure IT equipment meets organizational security standards, the MOST efficient approach is to:
6.
Segregation of duties is a security control PRIMARILY used to:
7.
Which of the following is the BEST approach when using sensitive customer data during the testing phase of a systems development project?
8.
Which of the following is the BEST defense against distributed denial of service (DDoS) attacks?
9.
Which of the following is the MOST important factor in an organizations selection of a key risk indicator (KRI)?
10.
During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address: