MultipleChoice
A security manager just finished the final copy of a risk assessment. This assessment contains a list of identified risks and she has to determine how to treat these risks.
What is the best option for the treatment of risks?
OptionsMultipleChoice
A protocol to investigate fraud by employees is being designed.
Which measure can be part of this protocol?
OptionsMultipleChoice
In a company the IT strategy is migrating towards a Service Oriented Architecture (SOA) so that migrating to the cloud is better feasible in the future. The security architect is asked to make a first draft of the security
architecture.
Which elements should the security architect draft?
OptionsMultipleChoice
The information security manager is writing the Information Security Management System (ISMS) documentation. The controls that are to be implemented must be described in one of the phases of the Plan-Do-
Check-Act (PDCA) cycle of the ISMS.
In which phase should these controls be described?
Options