<< Prev Question Next Question >>

Question 26/91

A Chief Information Security Officer (CISO) needs to create a policy set that meets international standards for data privacy and sharing. Which of the following should the CISO read and understand before writing the policies?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (91q)
Question 1: Which of the following are requirements that must be configu...
Question 2: Which of the following should be put in place when negotiati...
Question 3: A recent malware outbreak across a subnet included successfu...
Question 4: A company has drafted an insider-threat policy that prohibit...
Question 5: Which of the following refers to applications and systems th...
Question 6: An organization has a growing workforce that is mostly drive...
Question 7: An engineer wants to access sensitive data from a corporate-...
Question 8: A forensics investigator is examining a number of unauthoriz...
Question 9: Which of the following provides the BEST protection for sens...
Question 10: The Chief Security Officer (CSO) at a major hospital wants t...
Question 11: A security assessment determines DES and 3DES at still being...
Question 12: Which of the following types of controls is a turnstile?...
Question 13: A user recent an SMS on a mobile phone that asked for bank d...
Question 14: When used at the design stage, which of the following improv...
Question 15: A database administrator needs to ensure all passwords are s...
Question 16: A security analyst sees the following log output while revie...
Question 17: A company recently transitioned to a strictly BYOD culture d...
Question 18: A security analyst is reviewing information regarding recent...
Question 19: An attacker has successfully exfiltrated several non-salted ...
Question 20: A website developer is working on a new e-commerce website a...
Question 21: A company has decided to move its operations to the cloud. I...
Question 22: A development team employs a practice of bringing all the co...
Question 23: An organization wants to implement a third factor to an exis...
Question 24: Which of the following policies would help an organization i...
Question 25: A security analyst is investigation an incident that was fir...
Question 26: A Chief Information Security Officer (CISO) needs to create ...
Question 27: A network technician is installing a guest wireless network ...
Question 28: Users have been issued smart cards that provide physical acc...
Question 29: An organization needs to implement more stringent controls o...
Question 30: Which of the following is a team of people dedicated testing...
Question 31: A security analyst needs to produce a document that details ...
Question 32: A security analyst Is hardening a Linux workstation and must...
Question 33: Which of the following control sets should a well-written BC...
Question 34: A user is concerned that a web application will not be able ...
Question 35: An analyst visits an internet forum looking for information ...
Question 36: Which of the following disaster recovery tests is The LEAST ...
Question 37: Which of the following BEST describes a security exploit for...
Question 38: The process of passively gathering information poor to launc...
Question 39: A cybersecurity analyst reviews the log files from a web ser...
Question 40: Which of the following is MOST likely to outline the roles a...
Question 41: A security analyst is performing a forensic investigation co...
Question 42: A security analyst needs to determine how an attacker was ab...
Question 43: A security engineer needs to Implement the following require...
Question 44: Employees are having issues accessing the company's website....
Question 45: The Chief Financial Officer (CFO) of an insurance company re...
Question 46: A root cause analysis reveals that a web application outage ...
Question 47: An organization's RPO for a critical system is two hours. Th...
Question 48: Which of the following algorithms has the SMALLEST key size?...
Question 49: An attacker is trying to gain access by installing malware o...
Question 50: A security administrator suspects there may be unnecessary s...
Question 51: A startup company is using multiple SaaS and IaaS platforms ...
Question 52: Several employees return to work the day after attending an ...
Question 53: A smart switch has the ability to monitor electrical levels ...
Question 54: An organization that is located in a flood zone is MOST like...
Question 55: A network engineer needs to build a solution that will allow...
Question 56: Which of the following would be BEST to establish between or...
Question 57: A network engineer needs to create a plan for upgrading the ...
Question 58: Which of the following would be the BEST resource lor a soft...
Question 59: A cybersecurity administrator needs to add disk redundancy f...
Question 60: A Chief Security Officer (CSO) is concerned about the amount...
Question 61: On which of the following is the live acquisition of data fo...
Question 62: During a routine scan of a wireless segment at a retail comp...
Question 63: A user enters a password to log in to a workstation and is t...
Question 64: An analyst needs to identify the applications a user was run...
Question 65: A company recently set up an e-commerce portal to sell its p...
Question 66: A startup company is using multiple SaaS and IaaS platform t...
Question 67: Which of the following is the purpose of a risk register?...
Question 68: A company is designing the layout of a new datacenter so it ...
Question 69: A security analyst is logged into a Windows file server and ...
Question 70: Which of the following relets to applications and systems th...
Question 71: A security administrator needs to create a RAIS configuratio...
Question 72: Which of the following describes the BEST approach for deplo...
Question 73: A company is launching a new internet platform for its clien...
Question 74: A security analyst receives the configuration of a current V...
Question 75: Which of the following would be the BEST method for creating...
Question 76: An organization has been experiencing outages during holiday...
Question 77: A company has limited storage available and online presence ...
Question 78: Which of the following ISO standards is certified for privac...
Question 79: A security analyst is reviewing logs on a server and observe...
Question 80: A company uses wireless tor all laptops and keeps a very det...
Question 81: An attacked is attempting to exploit users by creating a fak...
Question 82: A commercial cyber-threat intelligence organization observes...
Question 83: A security administrator currently spends a large amount of ...
Question 84: A security analyst discovers several .jpg photos from a cell...
Question 85: Which of the following job roles would sponsor data quality ...
Question 86: A security engineer at an offline government facility is con...
Question 87: A large industrial system's smart generator monitors the sys...
Question 88: A security analyst is using a recently released security adv...
Question 89: A malicious actor recently penetration a company's network a...
Question 90: A security analyst has received an alert about being sent vi...
Question 91: A network administrator would like to configure a site-to-si...