Question 6 of 30A risk manager is asked to perform a complete risk assessment for a company. What is the best method to identify most of the threats to the company?
Correct Answer: A
Question 7 of 30It is important that an organization is able to prove compliance with information standards and legislation. One of the most important areas is documentation concerning access management. This process contains a number of activities including granting rights, monitoring identity status, logging, tracking access and removing rights. Part of these controls are audit trail records which may be used as evidence for both internal and external audits. What component of the audit trail is the most important for an external auditor?
Correct Answer: A
Question 8 of 30What is the main reason to use a firewall to separate two parts of your internal network?
Correct Answer: D
Question 9 of 30A company's webshop offers prospects and customers the possibility to search the catalog and place orders around the clock. In order to satisfy the needs of both customer and business several requirements have to be met. One of the criteria is data classification. What is the most important classification aspect of the unit price of an object in a 24h webshop?
Correct Answer: C
Question 10 of 30In a company the IT strategy is migrating towards a Service Oriented Architecture (SOA) so that migrating to the cloud is better feasible in the future. The security architect is asked to make a first draft of the security architecture. Which elements should the security architect draft?