Question 6 of 249

After an information security incident, an organization created a comprehensive backup procedure involving regular, automated backups of all critical data to offsite storage locations. By doing so, which principle of information security is the organization applying in this case?

Answer

Suggested Answer

The suggested answer is C.

Question 7 of 249

A data processing tool crashed when a user added more data to the buffer than its storage capacity allows. The incident was caused by the tool's inability to bound check arrays. What kind of vulnerability is this?

Answer

Suggested Answer

The suggested answer is A.

Question 8 of 249

Which of the following best defines managerial controls?

Answer

Suggested Answer

The suggested answer is A.

Community Votes8 votes
ASuggested
88%
B
13%
Question 9 of 249

What is the objective of penetration testing in the risk assessment process?

Answer

Suggested Answer

The suggested answer is B.

Question 10 of 249

Which controls are related to the Annex A controls of ISO/IEC 27001 and are often selected from other guides and standards or defined by the organization to meet its specific needs?

Answer

Suggested Answer

The suggested answer is A.

Community Votes6 votes
CMost voted
50%
ASuggested
50%