Friday, March 27, 2015
CISSP Exam Preparation (Question 289)
(289) Within the organizational environment, the security
function should report to an organizational level that
A. Has information technology
oversight.
B. Has autonomy from other
levels.
C. Is an external operation.
D. Provides the internal audit
function.
Correct Answer: B
Explanation/Reference:
- Muhammad Idham Azhari
Friday, March 20, 2015
CISSP Exam Preparation (Question 288)
(288) Organizations develop change control procedures to
ensure that
A. All changes are authorized,
tested, and recorded.
B. Changes are controlled by the
Policy Control Board (PCB).
C. All changes are requested,
scheduled, and completed on time.
D. Management is advised of
changes made to systems.
Correct Answer: A
Explanation/Reference:
"Change Control: Changes must be authorized,
tested, and recorded. Changed systems may require recertificationvand
re-accreditation." Pg 699 Shon Harris: All-in-One CISSP Certification
- Muhammad Idham Azhari
Friday, March 13, 2015
CISSP Exam Preparation (Question 287)
(287) Information security is the protection of data. Information
will be protected mainly based on:
A. Its sensitivity to the
company.
B. Its confidentiality.
C. Its value.
D. All of the choices.
Correct Answer: D
Explanation/Reference:
Information security is the protection of data
against accidental or malicious disclosure, modification, or destruction.
Information will be protected based on its value, confidentiality, and/or
sensitivity to the company, and the risk of loss or compromise. At a
minimum, information will be update-protected so that only authorized
individuals can modify or erase the information.
- Muhammad Idham Azhari
Friday, March 6, 2015
CISSP Exam Preparation (Question 286)
(286) The security planning process must define how security will be
managed, who will be responsible, and
A. Who practices are reasonable
and prudent for the enterprise.
B. Who will work in the security
department.
C. What impact security will have
on the intrinsic value of data.
D. How security measures will be
tested for effectiveness.
Correct Answer: D
Explanation/Reference:
- Muhammad Idham Azhari
Subscribe to:
Posts (Atom)