Which of the following is an accurate description of a balance sheet?
C
Which of the following is used to lure attackers into false environments so they can be monitored,
contained, or blocked from reaching critical systems?
B
What is one key difference between Capital expenditures and Operating expenditures?
C
As the CISO, you have been tasked with the execution of the companys key management program.
You
MUST ensure the integrity of encryption keys at the point of generation. Which principal of
encryption key
control will ensure no single individual can constitute or re-constitute a key?
A
Explanation:
Reference:
https://info.townsendsecurity.com/bid/23881/PCI-DSS-2-0-and-Encryption-Key-
Management
As the Chief Information Security Officer, you want to ensure data shared securely, especially when
shared with
third parties outside the organization. What protocol provides the ability to extend the network
perimeter with
the use of encapsulation and encryption?
D
Explanation:
Reference:
https://searchnetworking.techtarget.com/definition/virtual-private-network
Which of the following best describes the sensors designed to project and detect a light beam across
an area?
D
Explanation:
Reference:
https://en.wikipedia.org/wiki/Photoelectric_sensor
Michael starts a new job and discovers that he has unnecessary access to a variety of systems. Which
of the
following best describes the problem he has encountered?
B
As the Chief Information Security Officer, you are performing an assessment of security posture to
understand
what your Defense-in-Depth capabilities are. Which network security technology examines network
traffic flows
to detect and actively stop vulnerability exploits and attacks?
B
Explanation:
Reference:
https://searchsecurity.techtarget.com/definition/intrusion-prevention
Which of the following best describes an access control process that confirms the identity of the
entity seeking access to a logical or physical area?
B
Which of the following terms is used to describe countermeasures implemented to minimize risks to
physical
property, information, and computing systems?
D
Explanation:
Reference:
https://www.ibm.com/cloud/learn/security-controls
Which of the following is the MOST important reason for performing assessments of the security
portfolio?
A
During the last decade, what trend has caused the MOST serious issues in relation to physical
security?
A
What are the three stages of an identity and access management system?
A
Explanation:
Reference:
https://digitalguardian.com/blog/what-identity-and-access-management-iam
A digital signature addresses which of the following concerns?
A
Explanation:
Reference:
https://www.entrust.com/resources/certificate-solutions/learn/digital-signatures
At what level of governance are individual projects monitored and managed?
D