Question 36

Creating a secondary authentication process for network access would be an example of?
  • Question 37

    SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
    The CISO has implemented remediation activities. Which of the following is the MOST logical next step?
  • Question 38

    You are just hired as the new CISO and are being briefed on all the Information Security projects that your section has on going. You discover that most projects are behind schedule and over budget.
    Using the best business practices for project management you determine that the project correct aligns with the company goals. What needs to be verified FIRST?
  • Question 39

    Where does bottom-up financial planning primarily gain information for creating budgets?
  • Question 40

    A security professional has been promoted to be the CISO of an organization. The first task is to create a security policy for this organization. The CISO creates and publishes the security policy. This policy however, is ignored and not enforced consistently. Which of the following is the MOST likely reason for the policy shortcomings?