1.
Explanation
Explanation/Reference:The BEST way to isolate corporate data stored on employee-owned mobile devices would be to implement:
2.
Explanation
Explanation/Reference:Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered a significant exposure?
3.
Explanation
Explanation/Reference:In a large organization requesting outsourced services, which of the following contract clauses is MOST important to the information security manager?
4.
Explanation
Explanation/Reference:Which of the following service offerings in a typical Infrastructure as a Service (IaaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?
5.
Explanation
Explanation/Reference:Which of the following is the BEST approach for an information security manager when developing new information security policies?
6.
Explanation
Explanation/Reference:The FIRST step in establishing an information security program is to:
7.
Explanation
Explanation/Reference:Due to budget constraints, an internal IT application does not include the necessary controls to meet a client service level agreement (SLA). Which of the following is the information security manager's BEST course of action?
8.
Explanation
Explanation/Reference: Which of the following is the GREATEST benefit of integrating a security information and event management (SIEM) solution with traditional security tools such as IDs, anti-malware, and email screening solutions?
9.
Explanation
Explanation/Reference:Which of the following is the MOST effective way to detect security incidents?
10.
Explanation
Explanation/Reference:Which of the following would provide the MOST comprehensive view of the effectiveness of the information security function within an organization?