I Hate CBT's

View Original

Security Controls On Log Data Should Reflect

Question: Glen is an (ISC)² member. Glen receives an email from a company offering a set of answers for an (ISC)² certification exam. What should Glen do?

Answer: Inform (ISC)²

Question: Zarma is an (ISC)² member and a security analyst for Triffid Corporation. One of Zarma’s colleagues is interested in getting an (ISC)2 certification and asks Zarma what the test questions are like. What should Zarma do?

Answer: Explain the style and format of the questions, but no detail

Question: A system that collects transactional information and stores it in a record in order to show which users performed which actions is an example of providing

Answer: Non-repudiation

Question: The city of Grampon wants to ensure that all of its citizens are protected from malware, so the city council creates a rule that anyone caught creating and launching malware within the city limits will receive a fine and go to jail. What kind of rule is this?

Answer: Law

Question:

Answer: Standard