How often should the Statements of Standards for Attestation Engagements-16 (SSAE16)/International Standard on Assurance Engagements 3402 (ISAE3402) report of your vendors be reviewed?
You have been promoted to the CISO of a retail store. Which of the following compliance standards is the MOST important to the organization?
Which of the following are the MOST important factors for proactively determining system vulnerabilities?
What standard provides a framework for information security risk management within organizations?
When creating contractual agreements and procurement processes why should security requirements be included?
A CISO implements smart cards for credential management, and as a result has reduced costs associated with help desk operations supporting password resets. This demonstrates which of the following principles?
A recommended method to document the respective roles of groups and individuals for a given process is to:
Which of the following conditions would be the MOST probable reason for a security project to be rejected by the executive board of an organization?
An organization's Information Security Policy is of MOST importance because
A consultant is hired to do physical penetration testing at a large financial company. In the first day of his
assessment, the consultant goes to the company’s building dressed like an electrician and waits in the lobby for
an employee to pass through the main access gate, then the consultant follows the employee behind to get into
the restricted area. Which type of attack did the consultant perform?
What is the MOST probable explanation for a security policy that is often ignored and unenforced?
The Board of Directors of a publicly-traded company is concerned about the security implications of a strategic project that will migrate 50% of the organization’s information technology assets to the cloud. They have requested a briefing on the project plan and a progress report of the security stream of the project. As the CISO, you have been tasked with preparing the report for the Chief Executive Officer to present.
Using the Earned Value Management (EVM), what does a Cost Variance (CV) of -1,200 mean?
Which of the following is MOST effective when mitigating social engineering risks?
Which of the following most commonly falls within the scope of an information security governance steering committee?
Ensuring that the actions of a set of people, applications and systems follow the organization’s rules is BEST described as:
A CISO must conduct risk assessments using a method where the Chief Financial Officer (CFO) receives impact data in financial terms to use as input to select the proper level of coverage in a new cybersecurity insurance policy.
What is the MOST effective method of risk analysis to provide the CFO with the information required?
Who is PRIMARILY responsible for declaring a disaster and initiating processes to facilitate the recovery of critical assets in an organization?
When managing the security architecture for your company you must consider:
Which type of scan is used on the eye to measure the layer of blood vessels?
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
The CISO has validated audit findings, determined if compensating controls exist, and started initial remediation planning. Which of the following is the MOST logical next step?
A security team member calls you to inform you that one of your databases might have been compromised, but there are no details available. As the security leader, what should you do?
Which of the following would negatively impact a log analysis of a multinational organization?
In defining a strategic security plan for an organization, what should a CISO first analyze?
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
What type of control is being implemented by supervisors and data owners?
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how
hardware and software is implemented and managed within the organization. Which of the following principles
does this best demonstrate?
The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?
Acme Inc. has engaged a third party vendor to provide 99.999% up-time for their online web presence and had them contractually agree to this service level agreement. What type of risk tolerance is Acme exhibiting? (choose the BEST answer):
Which of the following is critical for a successful risk management program?
A recent audit has identified control exceptions and recommends implementing technology and processes to remediate the finding. Which of the following is the MOST likely reason for the organization to reject the recommendation?
What is the BEST way to achieve on-going compliance monitoring in an organization?
What type of control is used when patching systems with the latest updates?
The CIO of an organization has decided to assign the responsibility of internal IT audit to the IT team. This is consider a bad practice MAINLY because
You are the CISO for an investment banking firm. The firm is using artificial intelligence (AI) to assist in approving clients for loans.
Which control is MOST important to protect AI products?
When analyzing and forecasting a capital expense budget what are not included?
When working in the Payment Card Industry (PCI), how often should security logs be review to comply with the standards?
Providing oversight of an information security program for the organization is the primary responsibility of which group?
You have implemented a new security control. Which of the following risk strategy options have you engaged in?
While Cost Benefit Analysis (CBA) is the easiest calculation among financial tools, what is its main weakness?
Which of the following represents the HIGHEST negative impact resulting from an ineffective security governance program?
XYZ is a publicly-traded software development company.
Who is ultimately accountable to the shareholders in the event of a cybersecurity breach?
Which of the following best describes an access control process that confirms the identity of the entity seeking
access to a logical or physical area?
The success of the Chief Information Security Officer is MOST dependent upon:
Knowing the potential financial loss an organization is willing to suffer if a system fails is a determination of which of the following?
Which of the following methodologies references the recommended industry standard that Information security project managers should follow?
What can you do to assist with law enforcement investigations if someone on your guest wireless network is suspected of committing an illegal act using your network?
The patching and monitoring of systems on a consistent schedule is required by?
Enforcing the implementation and management of security controls within services or products offered by third-party providers is a vital component of which security program service to the business?
An organization has decided to develop an in-house BCM capability. The organization has determined it is best to follow a BCM standard published by the International Organization for Standardization (ISO).
The BEST ISO standard to follow that outlines the complete lifecycle of BCM is?
An ineffective security control was identified during an audit. What is the next action that should happen?
If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of business,
they just have to find a job opening, prepare someone to pass the interview, have that person hired, and they
will be in the organization. How would you prevent such type of attacks?
Which of the following terms is defined as the friction or opposition resulting from actual or perceived differences or incompatibilities?
A global retail company is creating a new compliance management process. Which of the following standards would be of PRIMARY importance?
Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.
What is one proven method to account for common elements found within separate regulations and/or standards?
When you develop your audit remediation plan what is the MOST important criteria?
From an information security perspective, information that no longer supports the main purpose of the business should be:
If the result of an NPV is positive, then the project should be selected. The net present value shows the present
value of the project, based on the decisions taken for its selection. What is the net present value equal to?
Which of the following methods are used to define contractual obligations that force a vendor to meet customer expectations?
Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements. During your investigation of the rumored compromise you discover that data has been breached and you have discovered the repository of stolen data on a server located in a foreign country. Your team now has full access to the data on the foreign server.
What action should you take FIRST?
The executive board has requested that the CISO of an organization define and Key Performance Indicators (KPI) to measure the effectiveness of the security awareness program provided to call center employees. Which of the following can be used as a KPI?
Scenario: You are the CISO and are required to brief the C-level executive team on your information security audit for the year. During your review of the audit findings you discover that many of the controls that were put in place the previous year to correct some of the findings are not performing as needed. You have thirty days until the briefing.
To formulate a remediation plan for the non-performing controls what other document do you need to review before adjusting the controls?
ABC Limited has recently suffered a security breach with customers’ social security number available on the dark web for sale. The CISO, during the time of the incident, has been fired, and you have been hired as the replacement. The analysis of the breach found that the absence of an insider threat program, lack of least privilege policy, and weak access control was to blame. You would like to implement key performance indicators to mitigate the risk.
Which metric would meet the requirement?
Which of the following is a PRIMARY purpose of a Security Operations Center (SOC)?
An organization recently acquired a Data Loss Prevention (DLP) solution, and two months after the implementation, it was found that sensitive data was posted to numerous Dark Web sites. The DLP application was checked, and there are no apparent malfunctions and no errors.
What is the MOST likely reason why the sensitive data was posted?
Which of the following is a term related to risk management that represents the estimated frequency at which a threat is expected to transpire?
The purpose of NIST SP 800-53 as part of the NIST System Certification and Accreditation Project is to establish a set of standardized, minimum security controls for IT systems addressing low, moderate, and high levels of concern for
Which of the following is used to establish and maintain a framework to provide assurance that information security strategies are aligned with organizational objectives?
The formal certification and accreditation process has four primary steps, what are they?
Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.
An effective way to evaluate the effectiveness of an information security awareness program for end users, especially senior executives, is to conduct periodic:
Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.
The organization has already been subject to a significant amount of credit card fraud. Which of the following is the MOST likely reason for this fraud?
A security professional has been promoted to be the CISO of an organization. The first task is to create a security policy for this organization. The CISO creates and publishes the security policy. This policy however, is ignored and not enforced consistently. Which of the following is the MOST likely reason for the policy shortcomings?
Access Control lists (ACLs), Firewalls, and Intrusion Prevention Systems are examples of
Which of the following is an accurate statement regarding capital expenses?
Which of the following is MOST important when dealing with an Information Security Steering committee:
The implementation of anti-malware and anti-phishing controls on centralized email servers is an example of what type of security control?
An organization correctly configured a Data Loss Prevention (DLP) technology. Afterward, sensitive data was found on public websites. What is the MOST likely reason for this situation?
An international organization is planning a project to implement encryption technologies to protect company confidential information. This organization has data centers on three continents. Which of the following would be considered a MAJOR constraint for the project?
A security officer wants to implement a vulnerability scanning program. The officer is uncertain of the state of vulnerability resiliency within the organization’s large IT infrastructure. What would be the BEST approach to minimize scan data output while retaining a realistic view of system vulnerability?
What process evaluates technical and non-technical security controls to validate that an implementation meets a specific set of security requirements?
When gathering security requirements for an automated business process improvement program, which of the following is MOST important?
An organization is required to implement background checks on all employees with access to databases containing credit card information. This is considered a security
Which of the following activities must be completed BEFORE you can calculate risk?
Which of the following best summarizes the primary goal of a security program?
Scenario: As you begin to develop the program for your organization, you assess the corporate culture and determine that there is a pervasive opinion that the security program only slows things down and limits the performance of the “real workers.”
What must you do first in order to shift the prevailing opinion and reshape corporate culture to understand the value of information security to the organization?
Which regulation or policy governs protection of personally identifiable user data gathered during a cyber investigation?
A newly appointed security officer finds data leakage software licenses that had never been used. The officer decides to implement a project to ensure it gets installed, but the project gets a great deal of resistance across the organization. Which of the following represents the MOST likely reason for this situation?
At which point should the identity access management team be notified of the termination of an employee?
Which of the following is the PRIMARY purpose of International Organization for Standardization (ISO) 27001?
Which of the following is used to lure attackers into false environments so they can be monitored, contained, or blocked from reaching critical systems?
Which of the following is the MOST important reason for performing assessments of the security portfolio?
Which of the following is considered one of the most frequent failures in project management?
The network administrator wants to strengthen physical security in the organization. Specifically, to implement a
solution stopping people from entering certain restricted zones without proper credentials. Which of following
physical security measures should the administrator use?
You have been promoted to the CISO of a big-box retail store chain reporting to the Chief Information Officer (CIO). The CIO’s first mandate to you is to develop a cybersecurity compliance framework that will meet all the store’s compliance requirements.
Which of the following compliance standard is the MOST important to the organization?
When information security falls under the Chief Information Officer (CIO), what is their MOST essential role?
Which of the following provides the BEST software risk remediation methods?
Which of the following information may be found in table top exercises for incident response?
What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?
How often should an environment be monitored for cyber threats, risks, and exposures?
Which control is used to discourage the exploitation of a vulnerability or system?
Which security technologies are MOST critical to implementing a zero trust model?
From the CISO’s perspective in looking at financial statements, the statement of retained earnings of an organization:
What is the difference between a quantitative and qualitative risk assessment?
The ability to demand the implementation and management of security controls on third parties providing services to an organization is
Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?
During the last decade, what trend has caused the MOST serious issues in relation to physical security?
Where does bottom-up financial planning primarily gain information for creating budgets?
You manage a newly created Security Operations Center (SOC), your team is being inundated with security alerts and don’t know what to do. What is the BEST approach to handle this situation?
Which of the following are primary concerns for management with regard to assessing internal control objectives?
Acceptable levels of information security risk tolerance in an organization should be determined by?
What is the MOST likely detrimental consequence arising from an ineffective security governance program within a highly regulated organization?
Which of the following is considered the foundation for the Enterprise Information Security Architecture (EISA)?
In effort to save your company money which of the following methods of training results in the lowest cost for the organization?
Which of the following has the PRIMARY responsibility for determining access rights requirements to information?
Which of the following is the MOST logical method of deploying security controls within an organization?
Which of the following defines the boundaries and scope of a risk assessment?
The establishment of a formal risk management framework and system authorization program is essential. The LAST step of the system authorization process is:
What is the PRIMARY guideline when analyzing the cost of a security control versus the cost of the asset?
Your organization provides open guest wireless access with no captive portals. What can you do to assist with law enforcement investigations if one of your guests is suspected of committing an illegal act using your network?
Which of the following is MOST beneficial in determining an appropriate balance between uncontrolled innovation and excessive caution in an organization?
Which of the following terms is used to describe countermeasures implemented to minimize risks to physical
property, information, and computing systems?
Quantitative Risk Assessments have the following advantages over qualitative risk assessments:
If a CISO wants to understand the liabilities of the company, she will refer to the:
Which of the following provides an independent assessment of a vendor’s internal security controls and overall posture?
Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?
Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY covered by which of the following plans?
A cloud computing environment that is bound together by technology that allows data and applications to be shared between public and private clouds is BEST referred to as a?
Which of the following is a primary method of applying consistent configurations to IT systems?
Which of the following is the MOST effective method for discovering common technical vulnerabilities within the
IT environment?
The BEST organization to provide a comprehensive, independent and certifiable perspective on established security controls in an environment is
When measuring the effectiveness of an Information Security Management System which one of the following would be MOST LIKELY used as a metric framework?
What is the name of a formal statement that defines the strategy, approach, or expectations related to specific concerns within an organization:
What is the MOST important reason to have senior leadership endorse security policies?
Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?
The organization does not have the time to remediate the vulnerability; however it is critical to release the application. Which of the following needs to be further evaluated to help mitigate the risks?
An audit was conducted and many critical applications were found to have no disaster recovery plans in place. You conduct a Business Impact Analysis (BIA) to determine impact to the company for each application. What should be the NEXT step?
When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?
Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements. During your investigation of the rumored compromise you discover that data has been breached and you have discovered the repository of stolen data on a server located in a foreign country. Your team now has full access to the data on the foreign server.
Your defenses did not hold up to the test as originally thought. As you investigate how the data was compromised through log analysis you discover that a hardworking, but misguided business intelligence analyst posted the data to an obfuscated URL on a popular cloud storage service so they could work on it from home during their off-time. Which technology or solution could you deploy to prevent employees from removing corporate data from your network? Choose the BEST answer.
Why would you follow a formal risk management process in an organization that requires the use of Personally Identifiable Information (PII) as part of the business model?
Which technology can provide a computing environment without requiring a dedicated hardware backend?
When performing a forensic investigation, what are the two MOST common data sources for obtaining evidence from a computer and mobile devices?
As the Risk Manager of an organization, you are task with managing vendor risk assessments. During the assessment, you identified that the vendor is engaged with high profiled clients, and bad publicity can jeopardize your own brand.
Which is the BEST type of risk that defines this event?
Which of the following is the BEST method to manage data that no longer provides business value?
To have accurate and effective information security policies how often should the CISO review the organization policies?
SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
What phase of the response provides measures to reduce the likelihood of an incident from recurring?
Which is the single MOST important factor for introducing digital evidence into a court of law?
Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?
SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.
What is the MOST logical course of action the CISO should take?
With a focus on the review and approval aspects of board responsibilities, the Data Governance Council recommends that the boards provide strategic oversight regarding information and information security, include these four things:
What is the BEST reason for having a formal request for proposal process?
A newly-hired CISO needs to understand the organization’s financial management standards for business units
and operations. Which of the following would be the best source of this information?
As the Chief Information Security Officer, you want to ensure data shared securely, especially when shared with
third parties outside the organization. What protocol provides the ability to extend the network perimeter with
the use of encapsulation and encryption?
Annual Loss Expectancy is derived from the function of which two factors?
In which of the following cases, would an organization be more prone to risk acceptance vs. risk mitigation?
An employee successfully avoids becoming a victim of a sophisticated spear phishing attack due to knowledge gained through the corporate information security awareness program. What type of control has been effectively utilized?
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
Which of the following is the FIRST action the CISO will perform after receiving the audit report?
According to the National Institute of Standards and Technology (NIST) SP 800-40, which of the following considerations are MOST important when creating a vulnerability management program?
When a CISO considers delaying or not remediating system vulnerabilities which of the following are MOST important to take into account?
As the CISO, you are the project sponsor for a highly visible log management project. The objective of the project is to centralize all the enterprise logs into a security information and event management (SIEM) system. You requested the results of the performance quality audits activity.
The performance quality audit activity is done in what project management process group?
Which of the following best describes the purpose of the International Organization for Standardization (ISO) 27002 standard?
Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and
uses the special card in order to access the restricted area of the target company. Just as the employee opens
the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so
that he can enter. What is the best way to undermine the social engineering activity of tailgating?
Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.
Which of the following is the reason the CISO has not been able to advance the security agenda in this organization?