712-50 Exam Question 111

What is the FIRST step in developing the vulnerability management program?
  • 712-50 Exam Question 112

    Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.
    You have decided to deal with risk to information from people first. How can you minimize risk to your most sensitive information before granting access?
  • 712-50 Exam Question 113

    What role should the CISO play in properly scoping a PCI environment?
  • 712-50 Exam Question 114

    Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information.
    All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN. The organization wants a more permanent solution to the threat to user credential compromise through phishing.
    What technical solution would BEST address this issue?
  • 712-50 Exam Question 115

    A CISO implements smart cards for credential management, and as a result has reduced costs associated with help desk operations supporting password resets. This demonstrates which of the following principles?