Acceptable risk is achieved when:
A. residual risk is minimized.
B. transferred risk is minimized.
C. control risk is minimized.
D. inherent risk is minimized.
The PRIMARY reason for assigning classes of sensitivity and criticality to information resources is to provide a basis for:
A. determining the scope for inclusion in an information security program.
B. defining the level of access controls.
C. justifying costs for information resources.
D. determining the overall budget of an information security program.
Management decisions concerning information security investments will be MOST effective when they are based on:
A. an annual loss expectancy (ALE) determined from the history of security events.
B. the formalized acceptance of risk analysis by management.
C. the reporting of consistent and periodic assessments of risks.
D. a process for identifying and analyzing threats and vulnerabilities.
Emergency actions are taken at the early stage of a disaster with the purpose of preventing injuries or loss of life and:
A. determining the extent of property damage.
B. preserving environmental conditions.
C. ensuring orderly plan activation.
D. reducing the extent of operational damage.
Which of the following is the MOST effective way to detect information security incidents?
A. Providing regular and up-to-date training for the incident response team
B. Establishing proper policies for response to threats and vulnerabilities
C. Performing regular testing of the incident response program
D. Educating and users on threat awareness and timely reporting
Which of the following is MOST likely to drive an update to the information security strategy?
A. A recent penetration test has uncovered a control weakness.
B. A major business application has been upgraded.
C. Management has decided to implement an emerging technology.
D. A new chief technology officer has been hired.
Which of the following has the GREATEST influence on the successful integration of information security within the business?
A. Organizational structure and culture
B. Risk tolerance and organizational objectives
C. The desired state of the organization
D. Information security personnel
Which of the following would MOST effectively ensure that a new server is appropriately secured?
A. Performing secure code reviews
B. Enforcing technical security standards
C. Conducting penetration testing
D. Initiating security scanning
Which of the following is MOST helpful in determining whether a phishing email is malicious?
A. Security awareness training
B. Reverse engineering
C. Threat intelligence
D. Sandboxing
An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident it is MOST important for the security manager to:
A. notify the business process owner.
B. follow the business continuity plan (BCP).
C. conduct an incident forensic analysis.
D. follow the incident response plan.