Question 1Question Show
In which of the following areas are data owners PRIMARILY responsible for establishing risk mitigation? Answer
Question 2Question Which of the following is the BEST justification to convince management to invest in an information security program? Answer
Question 3Question To improve the security of an organization's human resources (HR) system, an information security manager was presented with a choice to either implement an additional packet filtering firewall OR a heuristics-based intrusion detection system (IDS). How should the security manager with a limited budget choose between the two technologies? Answer
Question 4Question An organization's information security manager has been asked to hire a consultant to help assess the maturity level of the organization's information security management. What is the MOST important element of the request for proposal (RFP)? Answer
Question 5Question An organization is implementing intrusion protection in their demilitarized zone (DMZ). Which of the following steps is necessary to make sure that the intrusion prevention system (IPS) can view all traffic in the DMZ? Answer
Question 6Question Which of the following are likely to be updated MOST frequently? Answer
Question 7Question When performing a qualitative risk analysis, which of the following will BEST produce reliable results? Answer
Question 8Question Addressing production risks is PRIMARILY a function of: Answer
Question 9Question Which of the following requirements would have the lowest level of priority in information security? Answer
Question 10Question The MOST important component of a privacy policy is: Answer
Question 11Question Which of the following groups would be in the BEST position to perform a risk analysis for a business? Answer
Question 12Question Obtaining senior management support for an information security initiative can BEST be accomplished by: Answer
Question 13Question Which of the following training mechanisms is the MOST effective means of promoting an organizational security culture? Answer
Question 14Question Data owners are PRIMARILY responsible for: Answer
Question 15Question Which of the following are the MOST important individuals to include as members of an information security steering committee? Answer
Question 16Question Which one of the following measures will BEST indicate the effectiveness of an incident response process? Answer
Question 17Question The BEST way to obtain senior management commitment and support for information security investments is to: Answer
Question 18Question When securing wireless access points, which of the following controls would BEST assure confidentiality? Answer
Question 19Question Who should PRIMARILY provide direction on the impact of new regulatory requirements that may lead to major application system changes?
Answer
Question 20Question Which of the following choices will MOST influence how the information security program will be designed and implemented? Answer
Question 21Question The relationship between policies and corporate standards can BEST be described by which of the following associations? Answer
Question 22Question Which one of the following factors of a risk assessment typically involves the GREATEST amount of speculation? Answer
Question 23Question Which of the following is a key component of an incident response policy? Answer
Question 24Question The MOST complete business case for security solutions is one that: Answer
Question 25Question What is the MOST essential attribute of an effective key risk indicator (KRI)? Answer
Question 26Question Which of the following is MOST effective in protecting against the attack technique known as phishing? Answer
Question 27Question The acceptability of a partial system recovery after a security incident is MOST likely to be based on the: Answer
Question 28Question Which of the following presents the GREATEST exposure to internal attack on a network? Answer
Question 29Question Which of the following is the MOST important aspect that needs to be considered from a security perspective when payroll processes are outsourced to an external service provider? Answer
Question 30Question Which of the following BEST supports continuous improvement of the risk management process? Answer
Question 31Question Who would be the PRIMARY user of metrics regarding the number of email messages quarantined due to virus infection versus the number of infected email messages that were not caught? Answer
Question 32Question Which of the following is the MOST effective way to measure strategic alignment of an information security program? Answer
Question 33Question Ongoing tracking of remediation efforts to mitigate identified risks can BEST be accomplished through the use of which of the following? Answer
Question 34Question Which of the following is the MAIN objective in contracting with an external company to perform penetration testing?
Answer
Question 35Question The MOST effective approach to ensure the continued effectiveness of information security controls is by: Answer
Question 36Question Which of the following documents would be the BEST reference to determine whether access control mechanisms are appropriate for a critical application? Answer
Question 37Question The IT function has declared that it is not necessary to update the business impact analysis (BIA) when putting a new application into production because it does not produce modifications in the business processes. The information security manager should: Answer
Question 38Question Information security governance is PRIMARILY driven by: Answer
Question 39Question The FIRST step in developing an information security management program is to: Answer
Question 40Question A privacy statement on a company's e-commerce web site should include: Answer
Question 41Question What are the essential elements of risk? Answer
Question 42Question From an information security manager perspective, what is the immediate benefit of clearly-defined roles and responsibilities? Answer
Question 43Question What action should the security manager take FIRST when incident reports from different organizational units are inconsistent and highly inaccurate? Answer
Question 44Question What is the BIGGEST concern for an information security manager reviewing firewall rules? Answer
Question 45Question Which of the following is the MOST important reason for an information security review of contracts? Answer
Question 46Question Logging is an example of which type of defense against systems compromise? Answer
Question 47Question Which of the following would be the MOST important goal of an information security governance program? Answer
Question 48Question Which of the following is the FIRST step after the intrusion detection system (IDS) sends out an alert about a possible attack? Answer
Question 49Question Which of the following devices should be placed within a demilitarized zone (DMZ)? Answer
Question 50Question Which of the following BEST protects confidentiality of information? Answer
Question 51Question What is the MOST cost-effective method of identifying new vendor vulnerabilities? Answer
Question 52Question What is the MOST important factor in the successful implementation of an enterprisewide information security program? Answer
Question 53Question An organization's IT change management process requires that all change requests be approved by the asset owner and the information security manager. The PRIMARY objective of getting the information security manager's approval is to ensure that: Answer
Question 54Question The MOST important purpose of implementing an incident response plan is to: Answer
Question 55Question Which one of the following groups has final responsibility for the effectiveness of security controls? Answer
Question 56Question Which of the following factors will MOST affect the extent to which controls should be layered? Answer
Question 57Question What is the PRIMARY focus if an organization considers taking legal action on a security incident? Answer
Question 58Question The main mail server of a financial institution has been compromised at the superuser level; the only way to ensure the system is secure would be to: Answer
Question 59Question An information security manager is in the process of investigating a network intrusion. One of the enterprise's employees is a suspect. The manager has just obtained the suspect's computer and hard drive. Which of the following is the BEST next step? Answer
Question 60Question Which of the following is the MOST relevant metric to include in an information security quarterly report to the executive committee? Answer
Question 61Question Which of the following elements are the MOST essential to develop an information security strategy? Answer
Question 62Question Which of the following is the BEST way to erase confidential information stored on magnetic tapes? Answer
Question 63Question Which of the following is the MAIN reason for performing risk assessment on a continuous basis? Answer
Question 64Question A benefit of using a full disclosure (white box) approach as compared to a blind (black box) approach to penetration testing is that: Answer
Question 65Question Which of the following is the BEST indicator of the level of acceptable risk in an organization? Answer
Question 66Question Which web application attack facilitates unauthorized access to a database? Answer
Question 67Question Which of the following is an advantage of a centralized information security organizational structure? Answer
Question 68Question Which of the following is the BEST way to verify that all critical production servers are utilizing up-to-date virus signature files? Answer
Question 69Question A business unit intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should an information security manager take? Answer
Question 70Question IT-related risk management activities are MOST effective when they are: Answer
Question 71Question Which of the following BEST defines the relationships among security technologies? Answer
Question 72Question Which of the following is generally considered a fundamental component of an information security program? Answer
Question 73Question After a service interruption of a critical system, the incident response team finds that it needs to activate the warm recovery site. Discovering that throughput is only half of the primary site, the team nevertheless notifies management that it has restored the critical system. This is MOST likely because it has achieved the: Answer
Question 74Question Which of the following is the MOST critical consideration when collecting and preserving admissible evidence during an incident response? Answer
Question 75Question The BEST defense against successful phishing attacks is: Answer
Question 76Question Which of the following is MOST likely to improve the effectiveness of the incident response team? Answer
Question 77Question An information security manager has been asked to develop a change control process. What is the FIRST thing the information security manager should do? Answer
Question 78Question An organization is using a vendor-supplied critical application which has a maximum password length that does not comply with organizational security standards. Which of the following approaches BEST helps mitigate the weakness? Answer
Question 79Question The information classification scheme should: Answer
Question 80Question Which of the following choices is MOST likely to ensure that responsibilities are carried out? Answer
Question 81Question Which of the following items determines the acceptable level of residual risk in an organization? Answer
Question 82Question It is MOST important that information security architecture be aligned with which of the following? Answer
Question 83Question Which of the following is the PRIMARY reason for implementing a risk management program? Answer
Question 84Question Which of the following is MOST important to achieve proportionality in the protection of enterprise information systems? Answer
Question 85Question For risk management purposes, the value of a physical asset should be based on: Answer
Question 86Question Where should a firewall be placed? Answer
Question 87Question Data owners must provide a safe and secure environment to ensure confidentiality, integrity and availability of the transaction. This is an example of an information security: Answer
Question 88Question Which of the following is the BEST quantitative indicator of an organization's current risk tolerance? Answer
Question 89Question Which of the following tools should a newly hired information security manager review to gain an understanding of how effectively the current set of information security projects is managed? Answer
Question 90Question Which of the following is the MOST important objective of an information security strategy review? Answer
Question 91Question Management decided that the organization will not achieve compliance with a recently issued set of regulations. Which of the following is the MOST likely reason for the decision? Answer
Question 92Question Which of the following reasons is the MOST important to develop a strategy before implementing an information security program? Answer
Question 93Question Why would an organization decide not to take any action on a denial of service (DoS) risk found by the risk assessment team? Answer
Question 94Question Which would be one of the BEST metrics an information security manager can employ to effectively evaluate the results of a security program? Answer
Question 95Question Investments in information security technologies should be based on: Answer
Question 96Question In controlling information leakage, management should FIRST establish: Answer
Question 97Question Which of the following is the BEST indicator that operational risks are effectively managed in an enterprise? Answer
Question 98Question For an organization's information security program to be highly effective, who should have final responsibility for authorizing information system access? Answer
Question 99Question In addition to backup data, which of the following is the MOST important to store offsite in the event of a disaster? Answer
Question 100Question What is the PRIMARY focus of the change control process? Answer
Question 101Question The MOST effective technical approach to mitigate the risk of confidential information being disclosed in email attachments is to implement: Answer
Question 102Question What is the MAIN drawback of emailing password-protected zip files across the Internet? Answer
Question 103Question When recommending a control to protect corporate applications against structured query language (SQL) injection, the information security manager is MOST likely to suggest: Answer
Question 104Question What is the MAIN risk when there is no user management representation on the Information Security Steering Committee? Answer
Question 105Question Risk acceptance is a component of which of the following? Answer
Question 106Question The PRIMARY reason for senior management review of information security incidents is to: Answer
Question 107Question The value of tangible assets can be BEST determined by which of the following? Answer
Question 108Question While governance, risk and compliance (GRC) can be applied to any area of an organization, it is MOST often focused on which of the following areas? Answer
Question 109Question The MOST important characteristic of good security policies is that they: Answer
Question 110Question Which of the following roles would represent a conflict of interest for an information security manager? Answer
Question 111Question Which two components PRIMARILY must be assessed in an effective risk analysis? Answer
Question 112Question To be effective, risk management should be applied to: Answer
Question 113Question Which of the following is the MOST important information to include in an information security standard? Answer
Question 114Question An appropriate risk treatment method is: Answer
Question 115Question Which of the following would raise security awareness among an organization's employees? Answer
Question 116Question An enterprise is transferring its IT operations to an offshore location. An information security manager should PRIMARILY focus on: Answer
Question 117Question What is the MAIN objective for developing an information security program? Answer
Question 118Question What mechanisms are used to identify deficiencies that would provide attackers with an opportunity to compromise a computer system? Answer
Question 119Question Which of the following controls is MOST effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices? Answer
Question 120Question A critical device is delivered with a single user and password that is required to be shared for multiple users to access the device. An information security manager has been tasked with ensuring all access to the device is authorized. Which of the following would be the MOST efficient means to accomplish this? Answer
Question 121Question Which of the following is the MOST important element of information asset classification? Answer
Question 122Question What is the PRIMARY factor that should be taken into consideration when designing the technical solution for a disaster recovery site? Answer
Question 123Question Which of the following is the FIRST phase in which security should be addressed in the development cycle of a project? Answer
Question 124Question Which of the following types of risk is BEST assessed using quantitative risk assessment techniques? Answer
Question 125Question An organization has decided to implement governance, risk and compliance (GRC) processes into several critical areas of the enterprise. Which of the following objectives is the MAIN one? Answer
Question 126Question What is the BEST method for mitigating against network denial of service (DoS) attacks? Answer
Question 127Question While a disaster recovery exercise in the organization's hot site successfully restored all essential services, the test was deemed a failure. Which of the following circumstances would be the MOST likely cause? Answer
Question 128Question When implementing regulatory compliance, the PRIMARY controls for defining senior management guidance and intent are: Answer
Question 129Question Who would be in the BEST position to determine the recovery point objective (RPO) for business applications? Answer
Question 130Question Which resource is the most effective in preventing physical access tailgating/piggybacking? Answer
Question 131Question Which of the following BEST contributes to the design of data restoration plans? Answer
Question 132Question Which one of the following types of detection is NECESSARY to mitigate a denial or distributed denial of service (DoS or DDoS) attack? Answer
Question 133Question The MOST important reason that statistical anomaly-based intrusion detection systems (stat IDSs) are less commonly used than signature-based IDSs is that stat IDSs: Answer
Question 134Question Which of the following will BEST prevent external security attacks? Answer
Question 135Question To BEST improve the alignment of the information security objectives in an organization, the chief information security officer (CISO) should: Answer
Question 136Question Who should determine the appropriate classification of accounting ledger data located on a database server and maintained by a database administrator in the IT department? Answer
Question 137Question The typical requirement for security incidents to be resolved quickly and service restored is: Answer
Question 138Question The classification level of an asset must be PRIMARILY based on which of the following choices? Answer
Question 139Question Which of the following constitutes the MAIN project activities undertaken in developing an information security program? Answer
Question 140Question In a forensic investigation, which of the following would be the MOST important factor? Answer
Question 141Question How should an information security manager balance the potentially conflicting requirements of an international organization's security standards with local regulation? Answer
Question 142Question When performing a business impact analysis (BIA), which of the following should calculate the recovery time and cost estimates? Answer
Question 143Question Control baselines are MOST directly related to the: Answer
Question 144Question An information security manager mapping a job description to types of data access is MOST likely to adhere to which of the following information security principles? Answer
Question 145Question What is the BEST means to standardize security configurations in similar devices? Answer
Question 146Question What is the BEST tool to define minimum requirements for database security settings? Answer
Question 147Question Which of the following is the MOST cost-effective approach to achieve strategic alignment? Answer
Question 148Question An information security manager has been notified that a server that is utilized within the entire organization has been breached. What is the FIRST step to take? Answer
Question 149Question The MOST important reason for aligning information security governance with corporate governance is to: Answer
Question 150Question What is the BEST method for detecting and monitoring a hacker's activities without exposing information assets to unnecessary risk? Answer
Question 151Question The PRIMARY concern of an information security manager documenting a formal data retention policy is: Answer
Question 152Question The MOST effective way to ensure that outsourced service providers comply with the organization's information security policy would be: Answer
Question 153Question Which of the following devices should be placed within a DMZ? Answer
Question 154Question Which of the following design options is the lowest cost approach to achieve authentication and data integrity? Answer
Question 155Question What is the MOST appropriate IT incident response management approach for an organization that has outsourced its IT and incident management function? Answer
Question 156Question Serious security incidents typically lead to renewed focus by management on information security that then usually fades over time. What opportunity should the information security manager seize to BEST utilize this renewed focus? Answer
Question 157Question A company recently developed a breakthrough technology. Since this technology could give this company a significant competitive edge, which of the following would FIRST govern how this information is to be protected? Answer
Question 158Question Which of the following would be a MAJOR consideration for an organization defining its business continuity plan (BCP) or disaster recovery program (DRP)? Answer
Question 159Question Isolation and containment measures for a compromised computer have been taken and information security management is now investigating. What is the MOST appropriate next step? Answer
Question 160Question Which of the following components is established during the INITIAL steps of developing a risk management program? Answer
Question 161Question The PRIMARY objective of continuous monitoring is to: Answer
Question 162Question What is a reasonable approach to determine control effectiveness? Answer
Question 163Question A database was compromised by guessing the password for a shared administrative account and confidential customer information was stolen. The information security manager was able to detect this breach by analyzing which of the following? Answer
Question 164Question What is the MAIN reason for deploying a public key infrastructure (PKI) when implementing an information security program? Answer
Question 165Question After a significant security breach has occurred, what is the MOST important item to report to the chief information officer (CIO)? Answer
Question 166Question An organization has to comply with recently published industry regulatory requirements—compliance that potentially has high implementation costs. What should the information security manager do FIRST? Answer
Question 167Question The systems administrator did not immediately notify the security officer about a malicious attack. An information security manager could prevent this situation by: Answer
Question 168Question The data access requirements for an application should be determined by the: Answer
Question 169Question Which of the following is the MOST appropriate use of gap analysis? Answer
Question 170Question From an information security perspective, which of the following poses the MOST important impact concern in a homogenous network? Answer
Question 171Question The BEST process for assessing an existing risk level is a(n): Answer
Question 172Question Which of the following will MOST likely reduce the chances of an unauthorized individual gaining access to computing resources by pretending to be an authorized individual needing to have his/her password reset? Answer
Question 173Question Serious security incidents typically lead to renewed focus on information security by management. To BEST utilize this attention, the information security manager should make the case for: Answer
Question 174Question The MOST important factor in ensuring the success of an information security program is effective: Answer
Question 175Question Which of the following is MOST important in determining whether a disaster recovery test is successful? Answer
Question 176Question Which of the following is the MOST useful indicator of control effectiveness? Answer
Question 177Question An information security manager's MOST effective efforts to manage the inherent risk related to a third-party service provider will be the result of: Answer
Question 178Question What is the PRIMARY objective of conducting information security awareness training for all users? Answer
Question 179Question What is a PRIMARY advantage of performing a risk assessment on a consistent basis? Answer
Question 180Question Which of the following is the BEST way to confirm that disaster recovery planning is current? Answer
Question 181Question Which of the following would be MOST appropriate for collecting and preserving evidence? Answer
Question 182Question A new regulation for safeguarding information processed by a specific type of transaction has come to the attention of an information security officer. The officer should FIRST: Answer
Question 183Question Which of the following will require the MOST effort when supporting an operational information security program? Answer
Question 184Question If an organization has a requirement for continuous operations, which of the following approaches would be BEST to test response and recovery? Answer
Question 185Question An information security manager must understand the relationship between information security and business operations in order to: Answer
Question 186Question A risk assessment and business impact analysis (BIA) have been completed for a major proposed purchase and new process for an organization. There is disagreement between the information security manager and the business department manager who will own the process regarding the results and the assigned risk. Which of the following would be the BEST approach of the information security manager? Answer
Question 187Question Which of the following would represent a violation of the chain of custody when a backup tape has been identified as evidence in a fraud investigation? Answer
Question 188Question Which of the following would be the FIRST step when developing a business case for an information security investment? Answer
Question 189Question An organization has learned of a security breach at another company that utilizes similar technology. The FIRST thing the information security manager should do is: Answer
Question 190Question The MOST important factor in planning for the long-term retention of electronically stored business records is to take into account potential changes in: Answer
Question 191Question In a large organization, effective management of security incidents will be MOST dependent on: Answer
Question 192Question Which of the following situations presents the GREATEST information security risk for an organization with multiple, but small, domestic processing locations? Answer
Question 193Question When a proposed system change violates an existing security standard, the conflict would be BEST resolved by: Answer
Question 194Question Which of the following will be MOST important in calculating accurate return on investment (ROI) in information security? Answer
Question 195Question Which of the following is MOST important in the development of information security policies? Answer
Question 196Question What is the goal of risk aggregation? Answer
Question 197Question An online banking institution is concerned that the breach of customer personal information will have a significant financial impact due to the need to notify and compensate customers whose personal information may have been compromised. The institution determines that residual risk will always be too high and decides to: Answer
Question 198Question During the security review of organizational servers it was found that a file server containing confidential human resources (HR) data was accessible to all user IDs. What is the FIRST step the security manager should perform? Answer
Question 199Question Which of the following application systems should have the shortest recovery time objective (RTO)? Answer
Question 200Question The PRIMARY reason for classifying information resources according to sensitivity and criticality is to: Answer
Which of the following is most important to the successful implementation of an information security program?Which of the following is MOST important to the success of an information security program? Explanation: Sufficient senior management support is the most important factor for the success of an information security program.
Which of the following provides the best protection against the loss of confidentiality for sensitive data?Encryption is the most effective way to protect your data from unauthorized access.
Which of the following factors is the most important for determining the success of an information security strategy?The MOST important factor in ensuring the success of an information security program is effective: Options are : formulation of policies and procedures for information security.
Which of the following is the most important in developing security policies?Which of the following is MOST important in developing a security strategy? Explanation: Alignment with business strategy is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
|