Question 6 of 169

After an information security incident, an organization created a comprehensive backup procedure involving regular, automated backups of all critical data to offsite storage locations. By doing so, which principle of information security is the organization applying in this case?
Answer

Suggested Answer

The suggested answer is C.

Community Votes

No votes yet

Join the discussion to cast yours

Question 7 of 169

A data processing tool crashed when a user added more data to the buffer than its storage capacity allows. The incident was caused by the tool's inability to bound check arrays. What kind of vulnerability is this?
Answer

Suggested Answer

The suggested answer is A.

Community Votes

No votes yet

Join the discussion to cast yours

Question 8 of 169

Which of the following best defines managerial controls?
Answer

Suggested Answer

The suggested answer is A.

Community Votes8 votes
ASuggested
88%
B
13%
Question 9 of 169

What is the objective of penetration testing in the risk assessment process?
Answer

Suggested Answer

The suggested answer is B.

Community Votes

No votes yet

Join the discussion to cast yours

Question 10 of 169

Which controls are related to the Annex A controls of ISO/IEC 27001 and are often selected from other guides and standards or defined by the organization to meet its specific needs?
Answer

Suggested Answer

The suggested answer is A.

Community Votes6 votes
CMost voted
50%
ASuggested
50%