Question: 1
An organization is considering outsourcing applications and data to a Cloud Service
Provider (CSP). Which of the following is the MOST important concern regarding
privacy?
Question: 2
Assume that a computer was powered off when an information security professional
arrived at a crime scene. Which of the following actions should be performed after
the crime scene is isolated?
Question: 3
An organization has implemented a new backup process which protects confidential
data by encrypting the information stored on backup tapes. Which of the following is a
MAJOR data confidentiality concern after the implementation of this new backup
process?
Question: 4
Match the types of e-authentication tokens to their description.
Question: 5
Which of the following would be the FIRST step to take when implementing a patch management program?