Exam Questions And Correct Answers| Latest Update 2026
A consultant is conducting a compliance audit for a hospital. What type of information is
the consultant auditing?
A - PHI
B - PIFI
C - IP
D - PII
A - PHI
Protected Health Information (PHI) describes data used to identify an individual and
contains information about past, present, or future health, including related payments and
data used in the operation of a healthcare business.
Personal Identifiable Financial Information (PIFI) describes information about a consumer
provided to a financial institution and includes information such as account number,
credit/debit card number, personal information, and more.
Intellectual property (IP) describes intangible products of human thought and ingenuity.
Various laws protect intellectual property, such as copyrights, patents, trademarks, and
trade secrets.
Personally identifiable information (PII) describes data used to directly or indirectly identify
an individual.
,A system engineer is trying to explain due diligence to a group of system administrators.
What word would best describe the idea behind due diligence?
A - Prudent
B - Reasonable
C - Continuous
D - Patching
C - Continuous
Due diligence describes the ongoing and documented effort to continuously evaluate and
improve the mechanisms that protect assets.
Prudent would be more akin to due care, which is the basis of due diligence. Due diligence
would be the continued effort of due care.
Reasonable is also more akin to due care, which an ongoing effort of would be due
diligence. Due care is intentionally open-ended as "reasonable and expected" and defined
in many different ways, depending upon circumstances.
Patching is just a component of both due care, and by extension, due diligence. There are
several defense in depth layers beyond patching that would also apply.
A data center lead is preparing an organization for disaster recovery by performing an
actual test to ensure systems can failover but wants to minimize impact to production
systems. Which method should the data center lead use?
A - Parallel test
B - Full interruption
C - Walk-through
,D - Tabletop exercise
A - Parallel test
In a parallel test, the organization isolates the DR site from the primary site, activating it as
though the company is using the DR site. This is the best option to minimize impact.
Any mistakes or issues in a full interruption test can cause a true DR event since the
organization is performing the exercise on live systems and data.
A walk-through is not an active test, but it requires all groups included in the BCDR plan to
identify a representative to participate in a meeting to review the plan.
A tabletop exercise is not active but identifies a specific objective and then uses it to
determine whether all parties involved in the response know what to do.
A security architect is looking for examples of standards and regulations with descriptions
of Business Continuity and Disaster Recovery (BCDR) capabilities. Which of the following
are examples? Select 3 answers.
A - SOX
B - GLBA
C - DRaaS
D - FFIEC
A, B, C D; SOX, GLBA C FFIEC
The Sarbanes-Oxley (SOX) Act regarding fraudulent accounting is one example of
standards and regulations with descriptions of Business Continuity and Disaster Recovery
(BCDR) capabilities.
, The Gramm-Leach-Bliley (GLBA) Act regarding personal financial information is another
example of standards and regulations with descriptions of Business Continuity and
Disaster Recovery (BCDR) capabilities.
The Federal Financial Institutions Examination Council (FFIEC) regarding financial
institutions is another example of standards and regulations with descriptions of Business
Continuity and Disaster Recovery (BCDR) capabilities.
Disaster Recovery as a Service (DRaaS) uses public cloud services as a DR site. This is not
a standard or regulation but rather a mechanism to achieve it.
A security manager is planning for the needs of an immediate frantic and pressing
emergency. Which plan should the security manager focus on developing?
A - DRP
B - BCP
C - MSA
D - PLA
A - DRP
Disaster Recovery Plans (DRPs) focus on when events are their most frantic and pressing.
DRPs focus on the tasks required to bring critical systems back online.
Business Continuity Plans (BCPs) have a broad scope and cover the range of activities from
the development of a business continuity policy through the creation of the response
plans.