1. Business applications should be selected for disaster recovery testing on the basis of:
A) the results of contingency desktop checks B) the number of failure points that are being tested C) recovery time objectives (RTOs) D) criticality to the enterprise
2. When performing a data classification project, an information security manager should:
A) assign information critically and sensitivity B) identify information owners C) identify information custodians D) assign information access privileges
3. A third-party service provider has proposed a data loss prevention (DLP) solution. Which of the following MUST be in place for this solution to be relevant to the organization?
A) An adequate data testing environment B) Senior management support C) A business case D) A data classification
4. Which of the following is the BEST way to identify the potential impact of a successful attack on an organization's mission critical applications?
A) Execute regular vulnerability scans B) Conduct penetration testing C) Perform application vulnerability review D) Perform independent code review
5. Which of the following needs be established FIRST in order to categorize data properly?
A) A data protection policy B) A data classification framework C) A data asset inventory D) A data asset protection standard
Leave a comment