1. When using digital signatures, a sender transmits an encrypted message digest. This ensures that the:
A) message is not intercepted during transmission B) message is not altered during transmission C) message sender obtains acknowledgement of delivery D) message remains confidential during transmission
2. An information security risk analysis BEST assists an organization in ensuring that:
A) cost-effective decisions are made with regard to which assets need protection B) the organization implements appropriate security technologies C) the infrastructure has the appropriate level of access control D) an appropriate level of funding is applied to security processes
3. Which of the following would be the BEST way for an information security manager to justify ongoing annual maintenance fees associated with an intrusion prevention system (IPS)?
A) Perform industry research annually and document the overall ranking of the IPS. B) Perform a penetration test to demonstrate the ability to protect. C) Establish and present appropriate metrics that track performance. D) Provide yearly competitive pricing to illustrate the value of the IPS.
4. Reviewing which of the following would provide the GREATEST input to the asset classification process:
A) Risk assessment B) Sensitivity of the data C) Replacement cost of the asset D) Compliance requirements
5. When building a corporate-wide business continuity plan, it is discovered there are two separate lines of business systems that could be impacted by the same threat. Which of the following is the BEST method to determine the priority of systems recovery in the event of a disaster?
A) Reviewing the business plans of each department B) Evaluating the cost associated with each system's outage C) Reviewing each system's key performance indicators (KPIs) D) Comparing the recovery point objectives (RPOs)
Leave a comment