Certificate Questions with
Accurate Answers
Asset Classification correct answer The goal of information asset classification is
to ensure that assets are protected according to their value (criticality and
sensitivity) to the organization.
Asset correct answer Something of either tangible or intangible value that is
worth protecting, including people, information, infrastructure, finances and
reputation.
Assurance/SOC2 reports correct answer developed by the Association of
International Certified Professional Accountants (AICPA).
Availability correct answer ensures the timely and reliable access to and use of
information and systems. Includes safeguards to make sure data are not
accidentally or maliciously deleted. This is particularly important with mission-
critical systems because any interruptions in availability can result in significant
loss of productivity and revenue. Similarly, the loss of data can impact
management's ability to make effective decisions and responses. Can be
protected by the use of redundancy, backups, and implementation of business
continuity management and planning.
Balanced Score Card (BSC) correct answer includes performance measures
organized into four categories: financial, customer, internal business process, and
learning and growth perspectives.
, Baseline correct answer defines the minimum acceptable rules for policy
compliance
Capability Maturity Model Integration (CMMI) correct answer contains the
essential elements of effective processes. It also describes an improvement path
from ad hoc, immature processes, to disciplined, mature processes, with
improved quality and effectiveness.
COBIT5 correct answer offers sample IT metrics, based on the balanced scorecard
approach.
Compliance correct answer involves not only adhering to mandated requirements
defined by laws and regulations, but also demonstrating that adherence. Often
extends to voluntary requirements resulting from contractual obligations and
internal policies.
Confidentiality correct answer the protection of information from unauthorized
access or disclosure. Different types of information require different levels of
confidentiality, and the need for confidentiality can change over time. Personal,
financial and medical information require a higher degree of confidentiality than
publicly available information. Similarly, some enterprises need to protect
information on competitive products (e.g., business strategies, marketing
information, intellectual property).
Cybersecurity correct answer the "preservation of confidentiality, integrity and
availability of information in the Cyberspace"