Free HCISPP Exam Braindumps (page: 3)

Page 2 of 77

The threat modeling identifies a man-in-the-middle(MITM)exposure. Which countermeasure should the information system security officer (ISSO) select to mitigate the risk of a protected Health information (PHI) data leak?

  1. Auditing
  2. Anonymization
  3. Privacy monitoring
  4. Data retention

Answer(s): B



Which of the following is considered the last line defense in regard to a Governance, Risk managements, and compliance (GRC) program?

  1. Internal audit
  2. Internal controls
  3. Board review
  4. Risk management

Answer(s): B



Which of the following is the BEST example of weak management commitment to the protection of security assets and resources?

  1. poor governance over security processes and procedures
  2. immature security controls and procedures
  3. variances against regulatory requirements
  4. unanticipated increases in security incidents and threats

Answer(s): A



Which of the following is the BEST reason for the use of security metrics?

  1. They ensure that the organization meets its security objectives.
  2. They provide an appropriate framework for Information Technology (IT) governance.
  3. They speed up the process of quantitative risk assessment.
  4. They quantify the effectiveness of security processes.

Answer(s): B






Post your Comments and Discuss ISC2 HCISPP exam with other Community members:

HCISPP Discussions & Posts