91. An organization recently completed a risk assessment. Based on the findings in the risk assessment, the organization chose to purchase insurance to cover possible losses. This approach is known as:
Correct answer: (A)
Risk transfer
92. An organization recently underwent an audit of its financial applications. The audit report stated that there were several segregation-of-duties issues that were related to IT support of the application. What does this mean?
Correct answer: (D)
Individuals in IT have too many roles or privileges.
93. An organization suffered a virus outbreak when malware was downloaded by an employee in a spam message. This outbreak might not have happened had the organization followed what security principle:
Correct answer: (D)
Defense in depth
94. An organization that is building a disaster recovery capability needs to re- engineer its application servers to meet new recovery requirements of 40- hour RPO and 24-hour RTO. Which of the following approaches will best meet this objective?
Correct answer: (A)
Active/Passive server cluster with replication
95. An organization that is performing a disaster recovery planning project has determined that it needs to have on-site electric power available for as long as ten days, in the event of an electric utility failure. The best approach for this requirement is:
Correct answer: (D)
Uninterruptible power supply (UPS) and electric generator
96. An organization that wishes to conduct covert video surveillance should consider using:
Correct answer: (A)
Hidden video cameras
97. An organization wants to prevent SQL and script injection attacks on its Internet web application. The organization should implement a/an:
Correct answer: (C)
Application firewall
98. An organization wishes to purchase an application and is undergoing a formal procurement process to evaluate and select a product. What documentation should the organization use to make sure that the application selected has the appropriate security-related characteristics?
Correct answer: (C)
Security requirements
99. An organization's critical application is required to be continuously available, with only a few minutes' per month of downtime allowed. What measure should the organization implement to assure this level of availability?
Correct answer: (B)
Server clustering and data replication
100. An organization's data classification policy includes handling procedures for data at each level of sensitivity. The IT department backs up all data onto magnetic tape, resulting in tapes that contain data at all levels of sensitivity. How should these backup tapes be handled?
Correct answer: (B)
According to procedures for the highest sensitivity level