When dealing with risk, the information security practitioner may choose to:
As the CISO, you have been tasked with the execution of the company’s key management program. You
MUST ensure the integrity of encryption keys at the point of generation. Which principal of encryption key
control will ensure no single individual can constitute or re-constitute a key?
If the result of an NPV is positive, then the project should be selected. The net present value shows the present
value of the project, based on the decisions taken for its selection. What is the net present value equal to?
Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?
Which of the following best describes an access control process that confirms the identity of the entity seeking
access to a logical or physical area?
The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?
The new CISO was informed of all the Information Security projects that the organization has in progress. Two projects are over a year behind schedule and over budget. Using best business practices for project management you determine that the project correctly aligns with the company goals.
Which of the following needs to be performed NEXT?
Which of the following is the MAIN security concern for public cloud computing?
You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?
The process of identifying and classifying assets is typically included in the
Which of the following statements about Encapsulating Security Payload (ESP) is true?
What is the FIRST step in developing the vulnerability management program?
What oversight should the information security team have in the change management process for application security?
Scenario: You are the CISO and are required to brief the C-level executive team on your information security audit for the year. During your review of the audit findings you discover that many of the controls that were put in place the previous year to correct some of the findings are not performing as needed. You have thirty days until the briefing.
To formulate a remediation plan for the non-performing controls what other document do you need to review before adjusting the controls?
In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:
The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?
Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?
Your organization provides open guest wireless access with no captive portals. What can you do to assist with law enforcement investigations if one of your guests is suspected of committing an illegal act using your network?
The process for identifying, collecting, and producing digital information in support of legal proceedings is called
One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?
When operating under severe budget constraints a CISO will have to be creative to maintain a strong security organization. Which example below is the MOST creative way to maintain a strong security posture during these difficult times?
A severe security threat has been detected on your corporate network. As CISO you quickly assemble key members of the Information Technology team and business operations to determine a modification to security controls in response to the threat. This is an example of:
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how hardware and software is implemented and managed within the organization. Which of the following principles does this best demonstrate?
A person in your security team calls you at night and informs you that one of your web applications is potentially under attack from a cross-site scripting vulnerability. What do you do?
A CISO has recently joined an organization with a poorly implemented security program. The desire is to base the security program on a risk management approach. Which of the following is a foundational requirement in order to initiate this type of program?
This occurs when the quantity or quality of project deliverables is expanded from the original project plan.
Which of the following methodologies references the recommended industry standard that Information security project managers should follow?
When gathering security requirements for an automated business process improvement program, which of the following is MOST important?
The company decides to release the application without remediating the high-risk vulnerabilities. Which of the following is the MOST likely reason for the company to release the application?
Which of the following is critical in creating a security program aligned with an organization’s goals?
Risk appetite is typically determined by which of the following organizational functions?
A recommended method to document the respective roles of groups and individuals for a given process is to:
An organization has a stated requirement to block certain traffic on networks. The implementation of controls will disrupt a manufacturing process and cause unacceptable delays, resulting in sever revenue disruptions. Which of the following is MOST likely to be responsible for accepting the risk until mitigating controls can be implemented?
Information Security is often considered an excessive, after-the-fact cost when a project or initiative is completed. What can be done to ensure that security is addressed cost effectively?
Which of the following represents the BEST method for obtaining business unit acceptance of security controls within an organization?
Which of the following functions evaluates risk present in IT initiatives and/or systems when implementing an information security program?
A department within your company has proposed a third party vendor solution to address an urgent, critical business need. As the CISO you have been asked to accelerate screening of their security control claims. Which of the following vendor provided documents is BEST to make your decision:
Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?
Which one of the following BEST describes which member of the management team is accountable for the day-to-day operation of the information security program?
When entering into a third party vendor agreement for security services, at what point in the process is it BEST to understand and validate the security posture and compliance level of the vendor?
Which of the following represents the best method of ensuring business unit alignment with security program requirements?
An application vulnerability assessment has identified a security flaw in an application. This is a flaw that was previously identified and remediated on a prior release of the application. Which of the following is MOST likely the reason for this recurring issue?
Scenario: The new CISO was informed of all the Information Security projects that the section has in progress. Two projects are over a year behind schedule and way over budget.
Which of the following will be most helpful for getting an Information Security project that is behind schedule back on schedule?
Which technology can provide a computing environment without requiring a dedicated hardware backend?
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
Which of the following is the FIRST action the CISO will perform after receiving the audit report?
Physical security measures typically include which of the following components?
Your incident handling manager detects a virus attack in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the incident handling process will utilize the signature to resolve this incident?
Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and
uses the special card in order to access the restricted area of the target company. Just as the employee opens
the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so
that he can enter. What is the best way to undermine the social engineering activity of tailgating?
The ability to demand the implementation and management of security controls on third parties providing services to an organization is
Which of the following is the MOST effective method for discovering common technical vulnerabilities within the
IT environment?
Which of the following is MOST useful when developing a business case for security initiatives?
During the last decade, what trend has caused the MOST serious issues in relation to physical security?
What is the primary reason for performing a return on investment analysis?
A newly-hired CISO needs to understand the organization’s financial management standards for business units
and operations. Which of the following would be the best source of this information?
SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.
What is the MOST logical course of action the CISO should take?
The formal certification and accreditation process has four primary steps, what are they?
SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
What phase of the response provides measures to reduce the likelihood of an incident from recurring?
You are just hired as the new CISO and are being briefed on all the Information Security projects that your section has on going. You discover that most projects are behind schedule and over budget.
Using the best business practices for project management you determine that the project correct aligns with the company goals. What needs to be verified FIRST?
Which of the following is the MOST logical method of deploying security controls within an organization?
As the CISO you need to write the IT security strategic plan. Which of the following is the MOST important to review before you start writing the plan?
Simon had all his systems administrators implement hardware and software firewalls to ensure network
security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized
traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker
group was able to get into the network and modify files hosted on the company's website. After searching
through the firewall and server logs, no one could find how the attackers were able to get in. He decides that
the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts
administrators when a critical file is altered. What tool could Simon and his administrators implement to
accomplish this?
The ability to require implementation and management of security controls within third-party provided services is a critical part of:
What is an approach to estimating the strengths and weaknesses of alternatives used to determine options, which provide the BEST approach to achieving benefits while preserving savings called?
With a focus on the review and approval aspects of board responsibilities, the Data Governance Council recommends that the boards provide strategic oversight regarding information and information security, include these four things:
As the Risk Manager of an organization, you are task with managing vendor risk assessments. During the assessment, you identified that the vendor is engaged with high profiled clients, and bad publicity can jeopardize your own brand.
Which is the BEST type of risk that defines this event?
Of the following types of SOCs (Security Operations Centers), which one would be MOST likely used if the CISO has decided to outsource the infrastructure and administration of it?
Which level of data destruction applies logical techniques to sanitize data in all user-addressable storage locations?
The alerting, monitoring, and lifecycle management of security-related events are typically managed by the:
Which of the following is the MOST effective way to secure the physical hardware hosts in a virtualized environment?
What organizational structure combines the functional and project structures to create a hybrid of the two?
What is protected by Federal Information Processing Standards (FIPS) 140-2?
The primary responsibility for assigning entitlements to a network share lies with which role?
Which of the following is the MOST important to share with an Information Security Steering Committee:
Optical biometric recognition such as retina scanning provides access to facilities through reading the unique characteristics of a person’s eye.
However, authorization failures can occur with individuals who have?
What is a key policy that should be part of the information security plan?
Which of the following strategies provides the BEST response to a ransomware attack?
What is the primary difference between Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?
What are the four groups that are critical to the success of evaluating and approving contracts during the negotiation phase?
What Enterprise Architecture Framework is business-centric and is composed of eight phases?
Which publication serves as a resource of enterprise security-based standards and BEST practices?
While Cost Benefit Analysis (CBA) is the easiest calculation among financial tools, what is its main weakness?
In defining a strategic security plan for an organization, what should a CISO first analyze?
The Health Insurance Portability and Accountability Act (HIPAA) requires an agreement between Cloud Service Providers (CCSP) and the covered entity. Based on HIPAA. which document must be completed between the covered entity and the CCSP?
When developing the Business Impact Assessment (BIA), which of the following MOST closely relates to data backup and restoration?
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks
2.Scanning and enumeration
3.Maintaining Access
4.Reconnaissance
5.Gaining Access
While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?
Security related breaches are assessed and contained through which of the following?
The process of creating a system which divides documents based on their security level to manage access to private data is known as
SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
Which of the following is a countermeasure to prevent unauthorized database access from web applications?
What type of attack requires the least amount of technical equipment and has the highest success rate?
Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?
A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?
An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?
Which is the BEST solution to monitor, measure, and report changes to critical data in a system?
Which of the following are necessary to formulate responses to external audit findings?
What is a difference from the list below between quantitative and qualitative Risk Assessment?
An organization’s firewall technology needs replaced. A specific technology has been selected that is less costly than others and lacking in some important capabilities. The security officer has voiced concerns about sensitive data breaches but the decision is made to purchase. What does this selection indicate?
Which of the following is a MAJOR consideration when an organization retains sensitive customer data and uses this data to better target the organization’s products and services?
With respect to the audit management process, management response serves what function?
The executive board has requested that the CISO of an organization define and Key Performance Indicators (KPI) to measure the effectiveness of the security awareness program provided to call center employees. Which of the following can be used as a KPI?
Which of the following is considered to be an IT governance framework and a supporting toolset that allows for managers to bridge the gap between control requirements, technical issues, and business risks?
Which of the following is considered the MOST effective tool against social engineering?
Which of the following is the MAIN reason to follow a formal risk management process in an organization that hosts and uses privately identifiable information (PII) as part of their business models and processes?
You are the Chief Information Security Officer of a large, multinational bank and you suspect there is a flaw in a two factor authentication token management process. Which of the following represents your BEST course of action?
When would it be more desirable to develop a set of decentralized security policies and procedures within an enterprise environment?
When choosing a risk mitigation method what is the MOST important factor?
You have purchased a new insurance policy as part of your risk strategy. Which of the following risk strategy options have you engaged in?
A new CISO just started with a company and on the CISO's desk is the last complete Information Security Management audit report. The audit report is over two years old. After reading it, what should be the CISO's FIRST priority?
The single most important consideration to make when developing your security program, policies, and processes is:
Which of the following international standards can be BEST used to define a Risk Management process in an organization?
An organization is required to implement background checks on all employees with access to databases containing credit card information. This is considered a security
The CIO of an organization has decided to assign the responsibility of internal IT audit to the IT team. This is consider a bad practice MAINLY because
Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?
When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?
Assigning the role and responsibility of Information Assurance to a dedicated and independent security group is an example of: