Question: 1
During an audit, the auditor finds evidence of potentially illegal activity. Which of the following is the MOST appropriate action to take?
Question: 2
If the wide area network (WAN) is supporting converged applications like Voice over Internet Protocol (VoIP), which of the following becomes even MORE essential to the assurance of network?
Question: 3
Which of the following departments initiates the request, approval, and provisioning business process?
Question: 4
Which of the following is an initial consideration when developing an information security management system (ISMS)?
Question: 5
The core component of Role Based Access control (RBAC) must be constructed of defined data elements, Which elements are required?
A Users, permissions, operators, and protected objects
B Users, rotes, operations, and protected objects
C Roles, accounts, permissions, and protected objects
D Roles, operations, accounts, and protected objects
Answer : B
Show Answer
Hide Answer