Question 6 of 30
A risk manager is asked to perform a complete risk assessment for a company.
What is the best method to identify most of the threats to the company?
Correct Answer: A

Question 7 of 30
It is important that an organization is able to prove compliance with information standards and legislation. One of the most important areas is documentation concerning access management. This process contains a number of activities including granting rights, monitoring identity status, logging, tracking access and removing rights. Part of these controls are audit trail records which may be used as evidence for both internal and external audits.
What component of the audit trail is the most important for an external auditor?
Correct Answer: A

Question 8 of 30
What is the main reason to use a firewall to separate two parts of your internal network?
Correct Answer: D

Question 9 of 30
A company's webshop offers prospects and customers the possibility to search the catalog and place orders around the clock. In order to satisfy the needs of both customer and business several requirements have to be met. One of the criteria is data classification.
What is the most important classification aspect of the unit price of an object in a 24h webshop?
Correct Answer: C

Question 10 of 30
In a company the IT strategy is migrating towards a Service Oriented Architecture (SOA) so that migrating to the cloud is better feasible in the future. The security architect is asked to make a first draft of the security architecture.
Which elements should the security architect draft?
Correct Answer: C