Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Question #: 2416

Topic #: 1

Which is MOST important when contracting an external party to perform a


penetration test?

 A. Obtain approval from IT management.


 B. Define the project scope.
 C. Increase the frequency of log reviews.
 D. Provide network documentation.

Suggested Answer: B 🗳️

To properly implement data classification, establishing data ownership is an important first


step.

Question #: 2737
Topic #: 1

Which of the following is the MOST effective control for emergency changes to
application programs?

 A. Processing the change through change control with review of the change the
following day
 B. Keeping a sealed envelope containing a password that operators can use to make
emergency changes
 C. Periodically checking the application program libraries to detect whether
unauthorized changes have been made
 D. Preparing and approving program change forms before the changes are made

Suggested Answer: A 🗳️

You might also like