Question 11

Your company has a "no right to privacy" notice on all logon screens for your information systems and users sign an Acceptable Use Policy informing them of this condition. A peer group member and friend comes to you and requests access to one of her employee's email account. What should you do? (choose the BEST answer):
  • Question 12

    Which of the following is a term related to risk management that represents the estimated frequency at which a threat is expected to transpire?
  • Question 13

    A system is designed to dynamically block offending Internet IP-addresses from requesting services from a secure website. This type of control is considered
  • Question 14

    Scenario: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified. The CISO has validated audit findings, determined if compensating controls exist, and started initial remediation planning.
    Which of the following is the MOST logical next step?
  • Question 15

    Which of the following is considered one of the most frequent failures in project management?