AllExam Dumps

DUMPS, FREE DUMPS, VCP5 DUMPS| VMWARE DUMPS, VCP DUMPS, VCP4 DUMPS, VCAP DUMPS, VCDX DUMPS, CISCO DUMPS, CCNA, CCNA DUMPS, CCNP DUMPS, CCIE DUMPS, ITIL, EXIN DUMPS,


READ Free Dumps For
Warning: Undefined variable $vendor in /home1/bandbozu/getfreedumps.com/quiz.php on line 141
-
Warning: Undefined variable $exam_number in /home1/bandbozu/getfreedumps.com/quiz.php on line 141





Question ID 16929

The FIRST step in developing an information security management program is to:

Option A

identify business risks that affect the organization.

Option B

clarify organizational purpose for creating the program.

Option C

assign responsibility for the program.

Option D

assess adequacy of controls to mitigate business risks.

Correct Answer B
Explanation Explanation: In developing an information security management program, the first step is to clarify the organization's purpose for creating the program. This is a business decision based more on judgment than on any specific quantitative measures. After clarifying the purpose, the other choices are assigned and acted upon.


Question ID 16930

What would be the MOST significant security risks when using wireless local area network
(LAN) technology?

Option A

Man-in-the-middle attack

Option B

Spoofing of data packets

Option C

Rogue access point

Option D

Session hijacking

Correct Answer C
Explanation Explanation: A rogue access point masquerades as a legitimate access point The risk is that legitimate users may connect through this access point and have their traffic monitored. All other choices are not dependent on the use of a wireless local area network (LAN) technology.

Send email to admin@getfreedumps for new dumps request!!!