00:00

QUESTION 36

- (Exam Topic 2)
An organization is required to implement background checks on all employees with access to databases containing credit card information. This is considered a security

Correct Answer: B

QUESTION 37

- (Exam Topic 4)
The process of identifying and classifying assets is typically included in the

Correct Answer: B

QUESTION 38

- (Exam Topic 3)
To get an Information Security project back on schedule, which of the following will provide the MOST help?

Correct Answer: A

QUESTION 39

- (Exam Topic 5)
Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.
The CISO has been able to implement a number of technical controls and is able to influence the Information Technology teams but has not been able to influence the rest of the organization. From an organizational perspective, which of the following is the LIKELY reason for this?

Correct Answer: B

QUESTION 40

- (Exam Topic 5)
What is the difference between encryption and tokenization?

Correct Answer: B
Reference:
http://library.ahima.org/doc?oid=104090#.X_dwWolR3eQ