712-50 Exam Question 31
A security professional has been promoted to be the CISO of an organization. The first task is to create a security policy for this organization. The CISO creates and publishes the security policy. This policy however, is ignored and not enforced consistently. Which of the following is the MOST likely reason for the policy shortcomings?
712-50 Exam Question 32
Dataflow diagrams are used by IT auditors to:
712-50 Exam Question 33
Simon had all his systems administrators implement hardware and software firewalls to ensure network security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker group was able to get into the network and modify files hosted on the company's website. After searching through the firewall and server logs, no one could find how the attackers were able to get in. He decides that the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts administrators when a critical file is altered. What tool could Simon and his administrators implement to accomplish this?
712-50 Exam Question 34
Which of the following refers to the quantity or quality of project deliverables expanding from the original project plan?
712-50 Exam Question 35
What oversight should the information security team have in the change management process for application security?
