Question 146

Which of the following has the GREATEST impact on the implementation of an information security governance model?
  • Question 147

    SCENARIO: A CISO has several two-factor authentication systems under review and
    selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization's needs.
    What is the MOST logical course of action the CISO should take?
  • Question 148

    The single most important consideration to make when developing your security program, policies, and processes is:
  • Question 149

    What should an organization do to ensure that they have a sound Business Continuity (BC) Plan?
  • Question 150

    As the CISO, you have been tasked with the execution of the company's key management program. You MUST ensure the integrity of encryption keys at the point of generation. Which principal of encryption key control will ensure no single individual can constitute or re-constitute a key?