Which of the following functions evaluates risk present in IT initiatives and/or systems when implementing an information security program?
The security team has investigated the theft/loss of several unencrypted laptop computers containing sensitive corporate information. To prevent the loss of any additional corporate data it is unilaterally decided by the CISO that all existing and future laptop computers will be encrypted. Soon, the help desk is flooded with complaints about the slow performance of the laptops and users are upset. What did the CISO do wrong? (choose the BEST answer):
When selecting a security solution with reoccurring maintenance costs after the first year (choose the BEST answer):
Creating a secondary authentication process for network access would be an example of?
When managing the critical path of an IT security project, which of the following is MOST important?
A CISO sees abnormally high volumes of exceptions to security requirements and constant pressure from business units to change security processes. Which of the following represents the MOST LIKELY cause of this situation?
As the CISO for your company you are accountable for the protection of information resources commensurate with:
Which of the following is the PRIMARY purpose of International Organization for Standardization (ISO) 27001?