Chapter 6: Information Security Program Management
Practice Question Set 1
Q. 1
Answer: C. To mitigate impact
Explanation: Corrective controls are implemented to reduce the impact once a threat event has occurred. They facilitate the quick restoration of normal operations. Examples of corrective controls include the following:
- Business continuity planning
- Disaster recovery planning
- Incident response planning
- Backup procedures
Q. 2
Answer: D. The data custodian
Explanation: The data custodian is required to provide and implement adequate controls for the protection of data. The data owner is required to classify the level of protection required for their data.
Q. 3
Answer: C. A source code review
Explanation: The most effective method to identify and remove an application backdoor is to conduct a review of the source code. The other options will not be as effective.
Q. 4
Answer: C. A signed acceptable use policy
Explanation...