Security Controls On Log Data Should Reflect
Question: Glen is an (ISC)² member. Glen receives an email from a company offering a set of answers for an (ISC)² certification exam. What should Glen do?
Answer: Inform (ISC)²
Question: Zarma is an (ISC)² member and a security analyst for Triffid Corporation. One of Zarma’s colleagues is interested in getting an (ISC)2 certification and asks Zarma what the test questions are like. What should Zarma do?
Answer: Explain the style and format of the questions, but no detail
Question: A system that collects transactional information and stores it in a record in order to show which users performed which actions is an example of providing
Answer: Non-repudiation
Question: The city of Grampon wants to ensure that all of its citizens are protected from malware, so the city council creates a rule that anyone caught creating and launching malware within the city limits will receive a fine and go to jail. What kind of rule is this?
Answer: Law
Question:
Answer: Standard