What is the difference between encryption and tokenization?
A. Tokenization can be mathematically reversed to provide the original information
B. Encryption can be mathematically reversed to provide the original information
C. The token contains the all original information
D. Tokenization combined with hashing is always better than encryption
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
Ensuring that the actions of a set of people, applications and systems follow the organization's rules is BEST described as:
A. Mitigation management
B. Risk management
C. Security management
D. Compliance management
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.
This global retail company is expected to accept credit card payments. Which of the following is of MOST concern when defining a security program for this organization?
A. Adherence to local data breach notification laws
B. Compliance to Payment Card Industry (PCI) data security standards
C. International encryption restrictions
D. Compliance with local government privacy laws
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
You have been promoted to the CISO of a retail store. Which of the following compliance standards is the MOST important to the organization?
A. NIST Cybersecurity Framework
B. Payment Card Industry (PCI) Data Security Standard (DSS)
C. The Federal Risk and Authorization Management Program (FedRAMP)
D. ISO 27002
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
When a CISO considers delaying or not remediating system vulnerabilities which of the following are MOST important to take into account?
A. Risk Avoidance, Threat Level, and Consequences of Compromise
B. Threat Level, Risk of Compromise, and Consequences of Compromise
C. Reputational Impact, Financial Impact, and Risk of Compromise
D. Risk Transfer, Reputational Impact, and Consequences of Compromise
正解:B
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
When selecting a security solution with reoccurring maintenance costs after the first year, the CISO should:
(choose the BEST answer)
A. The CISO should cut other essential programs to ensure the new solution's continued use
B. Defer selection until the market improves and cash flow is positive
C. Communicate future operating costs to the CIO/CFO and seek commitment from them to ensure the new solution's continued use
D. Implement the solution and ask for the increased operating cost budget when it is time
正解:C
質問 7:
Scenario: As you begin to develop the program for your organization, you assess the corporate culture and determine that there is a pervasive opinion that the security program only slows things down and limits the performance of the "real workers." Which group of people should be consulted when developing your security program?
A. All of the above
B. End Users
C. Peers
D. Executive Management
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 8:
An organization has decided to develop an in-house BCM capability. The organization has determined it is best to follow a BCM standard published by the International Organization for Standardization (ISO).
The BEST ISO standard to follow that outlines the complete lifecycle of BCM is?
A. ISO 22318 Supply Chain Continuity
B. ISO 27031 BCM Readiness
C. ISO 22301 BCM Requirements
D. ISO 22317 BIA
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
Yagyu -
712-50試験に合格しました!712-50試験資料は本当に有効的です。友達にお勧めするつもりです。