A data processing tool crashed when a user added more data in the buffer than its storage capacity allows. The incident was caused by the tool's inability to bound check arrays. What kind of vulnerability is this?
Which three of the following options are an advantage of using a sampling plan for the audit?
Which two of the following statements are true?
Which two of the following statements are true?
You have a hard copy of a customer design document that you want to dispose off. What would you do
Which four of the following statements about audit reports are true?
An auditor of organisation A performs an audit of supplier B. Which two of the following actions is likely to represent a breach of confidentiality by the auditor after having identified findings in B's information security management system?
Based on the identified nonconformities. Company A established action plans that included the detected nonconformities, the root causes, and a general statement regarding each action that would be taken. Is this acceptable?
Which option below about the ISMS scope is correct?
A property of Information that has the ability to prove occurrence of a claimed event.
PDF + Testing Engine
|
---|
$57.75 |
Testing Engine
|
---|
$43.75 |
PDF (Q&A)
|
---|
$36.75 |
PECB Free Exams |
---|
![]() |