- (Exam Topic 2)
An organization is required to implement background checks on all employees with access to databases containing credit card information. This is considered a security
Correct Answer:
B
- (Exam Topic 4)
The process of identifying and classifying assets is typically included in the
Correct Answer:
B
- (Exam Topic 3)
To get an Information Security project back on schedule, which of the following will provide the MOST help?
Correct Answer:
A
- (Exam Topic 5)
Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.
The CISO has been able to implement a number of technical controls and is able to influence the Information Technology teams but has not been able to influence the rest of the organization. From an organizational perspective, which of the following is the LIKELY reason for this?
Correct Answer:
B
- (Exam Topic 5)
What is the difference between encryption and tokenization?
Correct Answer:
B
Reference:
http://library.ahima.org/doc?oid=104090#.X_dwWolR3eQ