Question 326

Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.
An effective way to evaluate the effectiveness of an information security awareness program for end users, especially senior executives, is to conduct periodic:
  • Question 327

    What is a key policy that should be part of the information security plan?
  • Question 328

    Acme Inc. has engaged a third party vendor to provide 99.999% up-time for their online web presence and had them contractually agree to this service level agreement. What type of risk tolerance is Acme exhibiting? (choose the BEST answer):
  • Question 329

    One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?
  • Question 330

    Creating good security metrics is essential for a CISO. What would be the BEST sources for creating security metrics for baseline defenses coverage?