Who in the organization determines access to information?
A. Compliance officer
B. Legal department
C. Data Owner
D. Information security officer
The FIRST step in establishing a security governance program is to?
A. Obtain senior level sponsorship
B. Conduct a workshop for all end users.
C. Conduct a risk assessment.
D. Prepare a security budget.
The establishment of a formal risk management framework and system authorization program is essential. The LAST step of the system authorization process is:
A. Getting authority to operate the system from executive management
B. Contacting the Internet Service Provider for an IP scope
C. Changing the default passwords
D. Conducting a final scan of the live system and mitigating all high and medium level vulnerabilities
When measuring the effectiveness of an Information Security Management System which one of the following would be MOST LIKELY used as a metric framework?
A. ISO 27001
B. ISO 27004
C. PRINCE2
D. ITILv3
At which point should the identity access management team be notified of the termination of an employee?
A. Immediately so the employee account(s) can be disabled
B. During the monthly review cycle
C. At the end of the day once the employee is off site
D. Before an audit
Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that
your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements.
During your investigation of the rumored compromise, you discover that data has been breached and that the repository of stolen data is on a server located in a foreign country. Your team now has full access to the data on the foreign server.
What action should you take FIRST?
A. Consult with other executives to develop an action plan
B. Contract with a credit reporting company for paid monitoring services for affected customers
C. Contact your local law enforcement agency
D. Destroy the repository of stolen data
A consultant is hired to do physical penetration testing at a large financial company. In the first day of his assessment, the consultant goes to the company's building dressed like an electrician and waits in the lobby for an employee to pass through the main access gate, then the consultant follows the employee behind to get into the restricted area. Which type of attack did the consultant perform?
A. Shoulder surfing
B. Tailgating
C. Social engineering
D. Mantrap
ABC Limited has recently suffered a security breach with customers' social security number available on the dark web for sale. The CISO, during the time of the incident, has been fired, and you have been hired as the replacement. The analysis of the breach found that the absence of an insider threat program, lack of least privilege policy, and weak access control was to blame. You would like to implement key performance indicators to mitigate the risk.
Which metric would meet the requirement?
A. Number of times third parties access critical information systems
B. Number of systems with known vulnerabilities
C. Number of users with elevated privileges
D. Number of websites with weak or misconfigured certificates
A bastion host should be placed:
A. Inside the DMZ
B. In-line with the data center firewall
C. Beyond the outer perimeter firewall
D. As the gatekeeper to the organization's honeynet
What is the name of a formal statement that defines the strategy, approach, or expectations related to specific concerns within an organization?
A. Policy
B. Procedure
C. Guideline
D. Standard