The information security architect of a large service provider advocates an open design of the
security architecture, as opposed to a secret design.
What is her main argument for this choice?
C
When is revision of an employee’s access rights mandatory?
D
An employee has worked on the organizational risk assessment. The goal of the assessment is not to
bring residual risks to zero, but to bring the residual risks in line with an organization's risk appetite.
When has the risk assessment program accomplished its primary goal?
C
In a company a personalized smart card is used for both physical and logical access control.
What is the main purpose of the person’s picture on the smart card?
A
What is a key item that must be kept in mind when designing an enterprise-wide information
security program?
B
Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are key terms in business
continuity management (BCM). Reducing loss of data is one of the focus areas of a BCM policy.
What requirement is in the data recovery policy to realize minimal data loss?
B
The security manager of a global company has decided that a risk assessment needs to be completed
across the company.
What is the primary objective of the risk assessment?
B
Who should be asked to check compliance with the information security policy throughout the
company?
B
The handling of security incidents is done by the incident management process under guidelines of
information security management. These guidelines call for several types of mitigation plans.
Which mitigation plan covers short-term recovery after a security incident has occurred?
C
An information security officer is asked to write a retention policy for a financial system. She is aware
of the fact that some data must be kept for a long time and other data must be deleted.
Where should she look for guidelines first?
C