The policies, processes, practices, and tools used to align the business value of information with the most appropriate and cost-effective infrastructure from the time information is conceived through its final disposition.
Which of the below business practices does this statement define?
Why have MOST European countries developed specific legislation that permits police and security services to monitor communications traffic for specific purposes, such as the detection of crime?
Which term describes the acknowledgement and acceptance of ownership of actions, decisions, policies and deliverables?
One traditional use of a SIEM appliance is to monitor for exceptions received via syslog.
What system from the following does NOT natively support syslog events?
Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?
Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on information security?
Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?
When undertaking disaster recovery planning, which of the following would NEVER be considered a "natural" disaster?
Which of the following is NOT a valid statement to include in an organisation's security policy?
A security analyst has been asked to provide a triple A service (AAA) for both wireless and remote access network services in an organization and must avoid using proprietary solutions.
What technology SHOULD they adapt?
James is working with a software programme that completely obfuscates the entire source code, often in the form of a binary executable making it difficult to inspect, manipulate or reverse engineer the original source code.
What type of software programme is this?
Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?
Which of the following types of organisation could be considered the MOST at risk from the theft of electronic based credit card data?
Which of the following controls would be the MOST relevant and effective in detecting zero day attacks?
Which of the following subjects is UNLIKELY to form part of a cloud service provision laaS contract?
In a security governance framework, which of the following publications would be at the HIGHEST level?
When preserving a crime scene for digital evidence, what actions SHOULD a first responder initially make?
Which of the following is often the final stage in the information management lifecycle?
When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always be taken into consideration?