A technical team investigating possible controls concludes that the most preferred control cannot be implemented as a result of too many constraints and decides to propose the second-best control. How is this control being referred to?
In vendor selection, what is the most important reason for a reference check?
In business continuity planning, the maximum age of the data to restore in the event of a disaster is considered which of the following?
Senior management requests a service requirement analysis to justify the need for a vendor. During the analysis, it is concluded that the internal IT provider has insufficient manpower and lacks the skills to deliver the work required. Which gaps are identified?
The project brief/project charter is created. Which of the following is not part of it?
What is the correct sequence of activities for a risk assessment?
The introduction of a security awareness program has resulted in a quick decrease in security incidents. Eight months later, security incidents are showing a sudden increase, and the blame is put on a non-functioning security awareness program. What is most likely the cause?
During the system (application) development project, the customer wants to know how software will be maintained to assure that future functional requirements are incorporated. What type of system maintenance is the customer looking for?
Senior management is concerned fraudulent activities may take place during large financial transactions. To reduce the risk of fraud, it expects the proper controls to be in place. Which security principle is in need of the highest attention?
The IT service catalog is being reviewed. Which of the below is not considered a criterion for review?
Before the marketing department will decide on a new advertising campaign, it wants to be able to gain more insights into the customer, being able to predict the products customers will purchase in the near future. What is a ‘must-have’ criterion in terms of the technology the marketing department is interested in?
During several project meetings, it is discovered that certain team members are not fully aware of, and/or do not understand, the activities for which they are responsible. Which process is most likely to be blamed for this?
A selection process for new IT staff has started. The Human Resource department has requested to follow the corporate staff hiring protocol. One mandatory item to be included is additional screening. What is verified by doing this?
The team responsible for network security has proposed a firewall as the preferred control for the network perimeter. How is this type of control categorized?
Lately, the support desk is receiving several requests for password resets from individuals who appear to be unknown to the organization. Possible criminal activities are suspected, and the organization wishes to address this issue in their information security awareness program. What is the area that requires awareness?