1.
Which of the following would be MOST important to include in a bring your own device (BYOD) policy with regard to lost or stolen devices? The need for employees to:
2.
An information security manager learns that the root password of an external FTP server may be subject to brute force attacks. Which of the following would be the MOST appropriate way to reduce the likelihood of a successful attack?
3.
An advantage of antivirus software schemes based on change detection is that they have:
4.
An organization outsources its payroll processing. Which of the following would be the BEST key risk indicator for monitoring the information security of the service provider?
5.
Ensuring that activities performed by outsourcing providers comply with information security policies can BEST be accomplished through the use of:
6.
Which of the following will BEST enable an effective information asset classification process?
7.
Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?
8.
Which of the following should be the MOST important criteria when defining data retention policies?
9.
Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of integrity?
10.
A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?