00:00

QUESTION 16

You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. One of the employees of your organization asks you the purpose of the security awareness, training and education program. What will be your answer?

Correct Answer: D

QUESTION 17

Which of the following security models focuses on data confidentiality and controlled access to classified information?

Correct Answer: A

QUESTION 18

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

Correct Answer: B

QUESTION 19

Software Development Life Cycle (SDLC) is a logical process used by programmers to develop software. Which of the following SDLC phases meets the audit objectives defined below: System and data are validated. System meets all user requirements. System meets all control requirements.

Correct Answer: B

QUESTION 20

Which of the following 'Code of Ethics Canons' of the '(ISC)2 Code of Ethics' states to act honorably, honestly, justly, responsibly and legally?

Correct Answer: A