Question 31

Which of the following is the MOST effective type of access control?
  • Question 32

    It is MOST important that information security architecture be aligned with which of the following?
  • Question 33

    Evidence from a compromised server has to be acquired for a forensic investigation. What would be the BEST source?
  • Question 34

    In an organization, the responsibilities for IT security are clearly assigned and enforced and an IT security risk and impact analysis is consistently performed. This represents which level of ranking in the information security governance maturity model?
  • Question 35

    Which of the following is MOST important to the successful implementation of an information security governance framework across the organization?