Scenario: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization's needs. The CISO is unsure of the information provided and orders a vendor proof of concept to validate the system's scalability. This demonstrates which of the following?
A) A methodology-based approach to ensure authentication mechanism functions
B) An approach providing minimum time impact to the implementation schedules
C) An approach that allows for minimum budget impact if the solution is unsuitable
D) A risk-based approach to determine if the solution is suitable for investment
Correct Answer:
Verified
Q190: Scenario: You are the newly hired Chief
Q191: Which type of scan is used on
Q192: Scenario: Your company has many encrypted telecommunications
Q193: Scenario: An organization has recently appointed a
Q194: Scenario: Critical servers show signs of erratic
Q196: Scenario: Your organization employs single sign-on (user
Q197: Scenario: A Chief Information Security Officer (CISO)
Q198: Scenario: An organization has made a decision
Q199: A consultant is hired to do physical
Q200: Scenario: The new CISO was informed of
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents