官术网_书友最值得收藏!

Sample questions

Q1. Which one of the following statements about security standards reflect the most appropriate definition?

  1. Security standards are step-by-step instructions to implement a security policy
  2. Security standards contains prescriptive statements, control objectives, and controls for implementing security
  3. Security standards document best practices
  4. Security standards are technology specific blue print diagrams

Q2. Security breach laws typically have provisions regarding who must comply with the law and additional applicable provisions. Which one of the following may not be an applicable provision?

  1. Definitions of personnel information
  2. Exemptions
  3. What constitutes a breach
  4. Requirements for certification

Q3. Which statements, among the following are published by (ISC)2 in the Code of professional ethics (this is a drag and drop type of question. Here you can draw a line from the list of answers from the left to the empty box on the right-hand side)?

Q4. A security practitioner is evaluating a privacy breach scenario for an ecommerce order placement and process setup. Choose a location where a possible privacy security breach could happen due to insecure implementation (this is a hot spot type of question. Place a tick mark in the appropriate circle).

主站蜘蛛池模板: 福州市| 苏州市| 栾城县| 晋城| 赤峰市| 阿拉善左旗| 扬州市| 垦利县| 册亨县| 大同市| 夏河县| 满城县| 佳木斯市| 通化市| 杭锦后旗| 瓦房店市| 吉木萨尔县| 灵寿县| 马山县| 宣城市| 鹿泉市| 亚东县| 邵武市| 灵川县| 博白县| 陆川县| 仁布县| 沈丘县| 广南县| 勐海县| 南川市| 青神县| 南汇区| 浦城县| 松江区| 汉源县| 荥阳市| 诸暨市| 宾阳县| 兰西县| 金川县|