You work as a security manager for SoftTech Inc. You are conducting a security awareness campaign for your employees. One of the employees of your organization asks you the purpose of the security awareness, training and education program. What will be your answer?
Correct Answer:
D
Which of the following security models focuses on data confidentiality and controlled access to classified information?
Correct Answer:
A
Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?
Correct Answer:
B
Software Development Life Cycle (SDLC) is a logical process used by programmers to develop software. Which of the following SDLC phases meets the audit objectives defined below: System and data are validated. System meets all user requirements. System meets all control requirements.
Correct Answer:
B
Which of the following 'Code of Ethics Canons' of the '(ISC)2 Code of Ethics' states to act honorably, honestly, justly, responsibly and legally?
Correct Answer:
A