Question 1 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link A Chief Information Security Officer has decided that purchasing insurance when the ALE of expected incidents exceeds $1 million is the most cost-effective approach. Which of the following does the $1 million represent? A. Risk indicator B. Risk tolerance C. Risk threshold D. Risk exposure Submit Answer
Question 2 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link After creating a contract for IT contractors, the human resources department changed several clauses. The contract has gone through three revisions. Which of the following processes should the human resources department follow to track revisions? A. Version validation B. Version changes C. Version updates D. Version control Submit Answer
Question 3 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link A Chief Information Officer wants to ensure that network devices cannot connect to the public Internet and the local network to directly perform firmware updates. The IT team must manually perform the update process by using a portable device. Which of the following architecture types best fits this description? A. Microservices B. Air-gapped C. Software-defined networking D. Serverless Submit Answer
Question 4 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link Which of the following is a common data removal option for companies that want to wipe sensitive data from hard drives in a repeatable manner but allow the hard drives to be reused? A. Sanitization B. Formatting C. Degaussing D. Defragmentation Submit Answer
Question 5 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link A security officer observes that a software development team is not complying with its corporate security policy on encrypting confidential data. Which of the following categories refers to this type of non-compliance? A. External B. Standard C. Regulation D. Internal Submit Answer