O o o O: Review The Residual Risk Level
O o o O: Review The Residual Risk Level
o Management support
o Business impact
o Regulatory compliance
o Residual risk
7. The PRIMARY reason an organization would require that
users sign an acknowledgment of their system access
responsibilities is to:
o Data controls
o Data ownership
o Data users
o Data volume
10. Which of the following is the MOST effective way to
ensure security policies are relevant to organizational
business practices?
o Processing information
o Securing information
o Classifying information
o Validating information
13. The PRIMARY focus of a training curriculum for
members of an incident response team should be:
o technology training.
o security awareness.
o external corporate communication.
o specific role training.
14. Which of the following should be the PRIMARY
objective of the information security incident response
process?
o Escalation paths
o Right-to-audit clause
o Termination language
o Key performance indicators (KPIs)
16. Which of the following is MOST important when
selecting an information security metric?
o Management support
o Business impact
o Regulatory compliance
o Residual risk
28. The PRIMARY reason an organization would require that
users sign an acknowledgment of their system access
responsibilities is to:
o Data controls
o Data ownership
o Data users
o Data volume
31. Which of the following is the MOST effective way to
ensure security policies are relevant to organizational
business practices?
o Processing information
o Securing information
o Classifying information
o Validating information
34. The PRIMARY focus of a training curriculum for members
of an incident response team should be:
o technology training.
o security awareness.
o external corporate communication.
o specific role training.
35. Which of the following should be the PRIMARY objective
of the information security incident response process?
o Escalation paths
o Right-to-audit clause
o Termination language
o Key performance indicators (KPIs)
37. Which of the following is MOST important when selecting
an information security metric?