IT CertificationsComprehensive Study Set

Cism Test Bank

626 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Which of the following tools is MOST appropriate for determining how long a security project will take to implement?

ANSWER

Critical path

QUESTION 2

When speaking to an organization's human resources department about information security, an information security manager should focus on the need for:

ANSWER

security awareness training for employees.

QUESTION 3

Good information security standards should:

ANSWER

define precise and unambiguous allowable limits.

QUESTION 4

Which of the following should be the FIRST step in developing an information security plan?

ANSWER

Analyze the current business strategy

QUESTION 5

Senior management commitment and support for information security can BEST be obtained through presentations that:

ANSWER

tie security risks to key business objectives

QUESTION 6

The MOST appropriate role for senior management in supporting information security is the:

ANSWER

approval of policy statements and funding

QUESTION 7

Which of the following would BEST ensure the success of information security governance within an organization?

ANSWER

Steering committees approve security projects

QUESTION 8

Information security governance is PRIMARILY driven by:

ANSWER

business strategy

QUESTION 9

Which of the following represents the MAJOR focus of privacy regulations?

ANSWER

Identifiable personal data

QUESTION 10

Investments in information security technologies should be based on:

ANSWER

value analysis

QUESTION 11

Retention of business records should PRIMARILY be based on

ANSWER

regulatory and legal requirements

QUESTION 12

Which of the following is characteristic of centralized information security management?

ANSWER

Better adherence to policies

QUESTION 13

Successful implementation of information security governance will FIRST require:

ANSWER

updated security policies

QUESTION 14

Which of the following individuals would be in the BEST position to sponsor the creation of an information security steering group?

ANSWER

Chief operating officer (COO)

QUESTION 15

The MOST important component of a privacy policy is:

ANSWER

notifications

QUESTION 16

The cost of implementing a security control should not exceed the:

ANSWER

asset value

QUESTION 17

When a security standard conflicts with a business objective, the situation should be resolved by:

ANSWER

performing a risk analysis

QUESTION 18

Minimum standards for securing the technical infrastructure should be defined in a security:

ANSWER

architecture

QUESTION 19

Which of the following is MOST appropriate for inclusion in an information security strategy?

ANSWER

Security processes, methods, tools and techniques

QUESTION 20

Senior management commitment and support for information security will BEST be attained by an information security manager by emphasizing:

ANSWER

organizational risk

QUESTION 21

Which of the following roles would represent a conflict of interest for an information security manager?

ANSWER

Final approval of information security policies

QUESTION 22

Which of the following situations must be corrected FIRST to ensure successful information security governance within an organization?

ANSWER

The data center manager has final signoff on all security projects

QUESTION 23

Which of the following requirements would have the lowest level of priority in information security?

ANSWER

Technical

QUESTION 24

When an organization hires a new information security manager, which of the following goals should this individual pursue FIRST?

ANSWER

Establish good communication with steering committee members

QUESTION 25

It is MOST important that information security architecture be aligned with which of the following?

ANSWER

Business goals and objectives

QUESTION 26

Which of the following is MOST likely to be discretionary?

ANSWER

Guidelines

QUESTION 27

Security technologies should be selected PRIMARILY on the basis of their:

ANSWER

ability to mitigate business risks

QUESTION 28

Which of the following are seldom changed in response to technological changes?

ANSWER

Policies

QUESTION 29

The MOST important factor in planning for the long-term retention of electronically stored business records is to take into account potential changes in:

ANSWER

application systems and media

QUESTION 30

Which of the following is characteristic of decentralized information security management across a geographically dispersed organization?

ANSWER

Better alignment to business unit needs

QUESTION 31

Which of the following is the MOST appropriate position to sponsor the design and implementation of a new security infrastructure in a large global enterprise?

ANSWER

Chief operating officer (COO)

QUESTION 32

Which of the following would be the MOST important goal of an information security governance program?

ANSWER

Ensuring trust in data

QUESTION 33

Relationships among security technologies are BEST defined through which of the following?

ANSWER

Security architecture

QUESTION 34

A business unit intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should an information security manager take?

ANSWER

Perform a risk analysis to quantify the risk

QUESTION 35

Acceptable levels of information security risk should be determined by:

ANSWER

die steering committee

QUESTION 36

The PRIMARY goal in developing an information security strategy is to:

ANSWER

support the business objectives of the organization

QUESTION 37

Senior management commitment and support for information security can BEST be enhanced through:

ANSWER

periodic review of alignment with business management goals

QUESTION 38

When identifying legal and regulatory issues affecting information security, which of the following would represent the BEST approach to developing information security policies?

ANSWER

Develop policies that meet all mandated requirements

QUESTION 39

Which of the following MOST commonly falls within the scope of an information security governance steering committee?

ANSWER

Prioritizing information security initiatives

QUESTION 40

Which of the following is the MOST important factor when designing information security architecture?

ANSWER

Stakeholder requirements

QUESTION 41

Which of the following characteristics is MOST important when looking at prospective candidates for the role of chief information security officer (CISO)?

ANSWER

Ability to understand and map organizational needs to security technologies

QUESTION 42

Which of the following are likely to be updated MOST frequently?

ANSWER

Procedures for hardening database servers

QUESTION 43

Who should be responsible for enforcing access rights to application data?

ANSWER

Security administrators

QUESTION 44

The chief information security officer (CISO) should ideally have a direct reporting relationship to the:

ANSWER

chief operations officer (COO)

QUESTION 45

Which of the following is the MOST essential task for a chief information security officer (CISO) to perform?

ANSWER

Develop an information security strategy paper

QUESTION 46

Developing a successful business case for the acquisition of information security software products can BEST be assisted by:

ANSWER

calculating return on investment (ROD projections)

QUESTION 47

When an information security manager is developing a strategic plan for information security, the timeline for the plan should be:

ANSWER

aligned with the business strategy

QUESTION 48

Which of the following is the MOST important information to include in a strategic plan for information security?

ANSWER

Current state and desired future state

QUESTION 49

Information security projects should be prioritized on the basis of:

ANSWER

impact on the organization

QUESTION 50

Which of the following is the MOST important information to include in an information security standard?

ANSWER

Last review date

QUESTION 51

Which of the following would BEST prepare an information security manager for regulatory reviews?

ANSWER

Perform self-assessments using regulatory guidelines and reports

QUESTION 52

An information security manager at a global organization that is subject to regulation by multiple governmental jurisdictions with differing requirements should:

ANSWER

establish baseline standards for all locations and add supplemental standards as required

QUESTION 53

Which of the following BEST describes an information security manager's role in a multidisciplinary team that will address a new regulatory requirement regarding operational risk?

ANSWER

Evaluate the impact of information security risks

QUESTION 54

From an information security manager perspective, what is the immediate benefit of clearly defined roles and responsibilities?

ANSWER

Better accountability

QUESTION 55

An internal audit has identified major weaknesses over IT processing. Which of the following should an information security manager use to BEST convey a sense of urgency to management?

ANSWER

Risk assessment reports

QUESTION 56

Reviewing which of the following would BEST ensure that security controls are effective?

ANSWER

Security metrics

QUESTION 57

Which of the following is responsible for legal and regulatory liability?

ANSWER

Board and senior management

QUESTION 58

While implementing information security governance an organization should FIRST:

ANSWER

define the security strategy

QUESTION 59

The MOST basic requirement for an information security governance program is to

ANSWER

be aligned with the corporate business strategy

QUESTION 60

Information security policy enforcement is the responsibility of the:

ANSWER

chief information security officer (CISO)

QUESTION 61

A good privacy statement should include:

ANSWER

what the company will do with information it collects

QUESTION 62

Which of the following would be MOST effective in successfully implementing restrictive password policies?

ANSWER

Security awareness program

QUESTION 63

When designing an information security quarterly report to management, the MOST important element to be considered should be the:

ANSWER

linkage to business area objectives

QUESTION 64

An information security manager at a global organization has to ensure that the local information security program will initially ensure compliance with the:

ANSWER

data privacy policy where data are collected.

QUESTION 65

A new regulation for safeguarding information processed by a specific type of transaction has come to the attention of an information security officer. The officer should FIRST:

ANSWER

assess whether existing controls meet the regulation.

QUESTION 66

Data owners must provide a safe and secure environment to ensure confidentiality, integrity and availability of the transaction. This is an example of an information security:

ANSWER

policy

QUESTION 67

At what stage of the applications development process should the security department initially become involved?

ANSWER

At detail requirements

QUESTION 68

A security manager is preparing a report to obtain the commitment of executive management to a security program. Inclusion of which of the following would be of MOST value?

ANSWER

Associating realistic threats to corporate objectives

QUESTION 69

The PRIMARY concern of an information security manager documenting a formal data retention policy would be:

ANSWER

business requirements

QUESTION 70

When personal information is transmitted across networks, there MUST be adequate controls over:

ANSWER

privacy protection.

QUESTION 71

An organization's information security processes are currently defined as ad hoc. In seeking to improve their performance level, the next step for the organization should be to:

ANSWER

ensure that security processes are consistent across the organization.

QUESTION 72

Who in an organization has the responsibility for classifying information?

ANSWER

Data owner

QUESTION 73

What is the PRIMARY role of the information security manager in the process of information classification within an organization?

ANSWER

Defining and ratifying the classification structure of information assets

QUESTION 74

Which of the following is MOST important in developing a security strategy?

ANSWER

Understanding key business objectives

QUESTION 75

Who is ultimately responsible for the organization's information?

ANSWER

Board of directors

QUESTION 76

Which of the following factors is a PRIMARY driver for information security governance that does not require any further justification?

ANSWER

Regulatory compliance

QUESTION 77

A security manager meeting the requirements for the international flow of personal data will need to ensure:

ANSWER

the agreement of the data subjects.

QUESTION 78

An information security manager mapping a job description to types of data access is MOST likely to adhere to which of the following information security principles?

ANSWER

Proportionality

QUESTION 79

Which of the following is the MOST important prerequisite for establishing information security management within an organization?

ANSWER

Senior management commitment

QUESTION 80

What will have the HIGHEST impact on standard information security governance models?

ANSWER

Complexity of organizational structure

QUESTION 81

In order to highlight to management the importance of integrating information security in the business processes, a newly hired information security officer should FIRST:

ANSWER

conduct a risk assessment.

QUESTION 82

Temporarily deactivating some monitoring processes, even if supported by an acceptance of operational risk, may not be acceptable to the information security manager if:

ANSWER

it implies compliance risks.

QUESTION 83

An outcome of effective security governance is:

ANSWER

strategic alignment.

QUESTION 84

How would an information security manager balance the potentially conflicting requirements of an international organization's security standards and local regulation?

ANSWER

Negotiate a local version of the organization standards

QUESTION 85

Who should drive the risk analysis for an organization?

ANSWER

Security manager

QUESTION 86

The FIRST step in developing an information security management program is to:

ANSWER

clarify organizational purpose for creating the program.

QUESTION 87

Which of the following is the MOST important to keep in mind when assessing the value of information?

ANSWER

The potential financial loss

QUESTION 88

What would a security manager PRIMARILY utilize when proposing the implementation of a security solution?

ANSWER

Business case

QUESTION 89

To justify its ongoing security budget, which of the following would be of MOST use to the information security' department?

ANSWER

Cost-benefit analysis

QUESTION 90

Which of the following situations would MOST inhibit the effective implementation of security governance:

ANSWER

High-level sponsorship

QUESTION 91

To achieve effective strategic alignment of security initiatives, it is important that:

ANSWER

Inputs be obtained and consensus achieved between the major organizational units.

QUESTION 92

What would be the MOST significant security risks when using wireless local area network (LAN) technology?

ANSWER

Rogue access point

QUESTION 93

When developing incident response procedures involving servers hosting critical applications, which of the following should be the FIRST to be notified?

ANSWER

Information security manager

QUESTION 94

In implementing information security governance, the information security manager is PRIMARILY responsible for:

ANSWER

developing the security strategy.

QUESTION 95

An information security strategy document that includes specific links to an organization's business activities is PRIMARILY an indicator of:

ANSWER

alignment.

QUESTION 96

When an organization is setting up a relationship with a third-party IT service provider, which of the following is one of the MOST important topics to include in the contract from a security standpoint?

ANSWER

Compliance with the organization's information security requirements.

QUESTION 97

To justify the need to invest in a forensic analysis tool, an information security manager should FIRST:

ANSWER

substantiate the investment in meeting organizational needs.

QUESTION 98

The MOST useful way to describe the objectives in the information security strategy is through: attributes and characteristics of the 'desired state."

ANSWER

conduct a risk assessment.

QUESTION 99

In order to highlight to management the importance of network security, the security manager should FIRST:

ANSWER

Skills inventory

QUESTION 100

When developing an information security program, what is the MOST useful source of information for determining available resources?

ANSWER

are aligned with organizational goals.

QUESTION 101

The MOST important characteristic of good security policies is that they:

ANSWER

support organizational objectives.

QUESTION 102

An information security manager must understand the relationship between information security and business operations in order to:

ANSWER

refer the issues to senior management along with any security recommendations.

QUESTION 103

The MOST effective approach to address issues that arise between IT management, business units and security management when implementing a new security strategy is for the information security manager to:

ANSWER

developing a business case.

QUESTION 104

Obtaining senior management support for establishing a warm site can BEST be accomplished by:

ANSWER

Include security responsibilities in the job description

QUESTION 105

Which of the following would be the BEST option to improve accountability for a system administrator who has security functions?

ANSWER

Defined objectives

QUESTION 106

Which of the following is the MOST important element of an information security strategy?

ANSWER

Cultures of the different countries

QUESTION 107

A multinational organization operating in fifteen countries is considering implementing an information security program. Which factor will MOST influence the design of the Information security program?

ANSWER

Increased business value

QUESTION 108

Which of the following is the BEST justification to convince management to invest in an information security program?

ANSWER

a statement regarding what the company will do with the information it collects.

QUESTION 109

On a company's e-commerce web site, a good legal statement regarding data privacy should include:

ANSWER

alignment with organizational goals and objectives .

QUESTION 110

The MOST important factor in ensuring the success of an information security program is effective:

ANSWER

A security program that enables business activities

QUESTION 111

Which of the following would be MOST helpful to achieve alignment between information security and organization objectives?

ANSWER

Continuous analysis, monitoring and feedback

QUESTION 112

Which of the following BEST contributes to the development of a security governance framework that supports the maturity model concept?

ANSWER

includes appropriate justification.

QUESTION 113

The MOST complete business case for security solutions is one that.

ANSWER

Organizational goals

QUESTION 114

Which of the following is MOST important to understand when developing a meaningful information security strategy?

ANSWER

It is easier to manage and control.

QUESTION 115

Which of the following is an advantage of a centralized information security organizational structure?

ANSWER

Obtain strong management support

QUESTION 116

Which of the following would help to change an organization's security culture?

ANSWER

a business case.

QUESTION 117

The BEST way to justify the implementation of a single sign-on (SSO) product is to use:

ANSWER

obtain high-level sponsorship.

QUESTION 118

The FIRST step in establishing a security governance program is to:

ANSWER

conflicting security controls with organizational needs.

QUESTION 119

An IS manager has decided to implement a security system to monitor access to the Internet and prevent access to numerous sites. Immediately upon installation, employees Hood the IT helpdesk with complaints of being unable to perform business functions on Internet sites. This is an example of:

ANSWER

managing risk relative to business objectives.

QUESTION 120

An organization's information security strategy should be based on:

ANSWER

A cost-benefit analysis of budgeted resources

QUESTION 121

Which of the following should be included in an annual information security budget that is submitted for management approval?

ANSWER

Reduction of the potential for civil or legal liability

QUESTION 122

Which of the following is a benefit of information security governance?

ANSWER

clear alignment with the goals and objectives of the organization.

QUESTION 123

Investment in security technology and processes should be based on:

ANSWER

business owner.

QUESTION 124

The data access requirements for an application should be determined by the:

ANSWER

analyzed under the retention policy.

QUESTION 125

From an information security perspective, information that no longer supports the main purpose of the business should be:

ANSWER

Laws and regulations of the country of origin may not be enforceable in the foreign country.

QUESTION 126

The organization has decided to outsource the majority of the IT department with a vendor that is hosting servers in a foreign country. Of the following, which is the MOST critical security consideration?

ANSWER

utilizing a top-down approach.

QUESTION 127

Effective IT governance is BEST ensured by:

ANSWER

gain the endorsement of executive management.

QUESTION 128

The FIRST step to create an internal culture that focuses on information security is to:

ANSWER

Obtain the support of the board of directors.

QUESTION 129

Which of the following is the BEST method or technique to ensure the effective implementation of an information security program?

ANSWER

setting the strategic direction of the program.

QUESTION 130

When an organization is implementing an information security governance program, its board of directors should be responsible for:

ANSWER

Review of the assessment with executive management for final input

QUESTION 131

A risk assessment and business impact analysis (BIA) have been completed for a major proposed purchase and new process for an organization. There is disagreement between the information security manager and the business department manager who will own the process regarding the results and the assigned risk. Which of the following would be the BES T approach of the information security manager?

ANSWER

Senior management

QUESTION 132

Who is responsible for ensuring that information is categorized and that specific protective measures are taken?

ANSWER

Require management to report on compliance

QUESTION 133

An organization's board of directors has learned of recent legislation requiring organizations within the industry to enact specific safeguards to protect confidential customer information. What actions should the board take next?

ANSWER

a balance between technical and business requirements.

QUESTION 134

Information security should be:

ANSWER

Support of senior management

QUESTION 135

What is the MOST important factor in the successful implementation of an enterprise wide information security program?

ANSWER

Information security plans are not aligned with business requirements

QUESTION 136

What is the MAIN risk when there is no user management representation on the Information Security Steering Committee?

ANSWER

the plan aligns with the organization's business plan.

QUESTION 137

The MAIN reason for having the Information Security Steering Committee review a new security controls implementation plan is to ensure that:

ANSWER

Organizational objectives and risk appetite

QUESTION 138

Which of the following should be determined while defining risk management strategies?

ANSWER

Preserving the confidentiality of sensitive data

QUESTION 139

When implementing effective security governance within the requirements of the company's security strategy, which of the following is the MOST important factor to consider?

ANSWER

To help determine the current state of risk

QUESTION 140

Which of the following is the BEST reason to perform a business impact analysis (BIA)?

ANSWER

acceptance

QUESTION 141

A risk mitigation report would include recommendations for:

ANSWER

an acceptable level.

QUESTION 142

A risk management program should reduce risk to:

ANSWER

security risks are subject to frequent change.

QUESTION 143

The MOST important reason for conducting periodic risk assessments is because:

ANSWER

Residual risk is minimized

QUESTION 144

Which of the following BEST indicates a successful risk management practice?

ANSWER

Loss of customer confidence

QUESTION 145

Which of the following would generally have the GREATEST negative impact on an organization?

ANSWER

Risk analysis results

QUESTION 146

A successful information security management program should use which of the following to determine the amount of resources devoted to mitigating exposures?

ANSWER

Prospective employee background checks

QUESTION 147

Which of the following will BEST protect an organization from internal security attacks?

ANSWER

replacement cost.

QUESTION 148

For risk management purposes, the value of an asset should be based on:

ANSWER

if unavailable.

QUESTION 149

In a business impact analysis, the value of an information system should be based on the overall cost:

ANSWER

residual risk is minimized.

QUESTION 150

Acceptable risk is achieved when:

ANSWER

individual business managers.

QUESTION 151

The value of information assets is BEST determined by:

ANSWER

Feasibility

QUESTION 152

During which phase of development is it MOST appropriate to begin assessing the risk of a new application system?

ANSWER

change management.

QUESTION 153

The MOST effective way to incorporate risk management practices into existing production systems is through:

ANSWER

Business impact analysis

QUESTION 154

Which of the following would be MOST useful in developing a series of recovery time objectives (RTOs)?

ANSWER

Restoration of the system

QUESTION 155

The recovery time objective (RTO) is reached at which of the following milestones?

ANSWER

Residual risk

QUESTION 156

Which of the following results from the risk assessment process would BEST assist risk management decision making?

ANSWER

Visibility of impact

QUESTION 157

The decision on whether new risks should fall under periodic or event-driven reporting should be based on which of the following?

ANSWER

Mitigation

QUESTION 158

Risk acceptance is a component of which of the following?

ANSWER

a level that the organization is willing to accept.

QUESTION 159

Risk management programs are designed to reduce risk to:

ANSWER

annually or whenever there is a significant change.

QUESTION 160

A risk assessment should be conducted:

ANSWER

minimize residual risk.

QUESTION 161

The MOST important function of a risk management program is to:

ANSWER

Permanent decline in customer confidence

QUESTION 162

Which of the following risks would BEST be assessed using qualitative risk assessment techniques?

ANSWER

Network address translation

QUESTION 163

Which of the following will BEST prevent external security attacks?

ANSWER

cost to obtain a replacement.

QUESTION 164

In performing a risk assessment on the impact of losing a server, the value of the server should be calculated using the:

ANSWER

priority of restoration.

QUESTION 165

A business impact analysis (BIA) is the BEST tool for calculating:

ANSWER

acceptable risk is probable.

QUESTION 166

When residual risk is minimized:

ANSWER

contain percentage estimates.

QUESTION 167

Quantitative risk analysis is MOST appropriate when assessment data:

ANSWER

Measuring current state vs. desired future state

QUESTION 168

Which of the following is the MOST appropriate use of gap analysis?

ANSWER

address areas with most significance.

QUESTION 169

Identification and prioritization of business risk enables project managers to:

ANSWER

address the potential size and likelihood of loss.

QUESTION 170

A risk analysis should:

ANSWER

Before-image restoration

QUESTION 171

The recovery point objective (RPO) requires which of the following?

ANSWER

Change management procedures are poor

QUESTION 172

Based on the information provided, which of the following situations presents the GREATEST information security risk for an organization with multiple, but small, domestic processing locations?

ANSWER

Organizational activities

QUESTION 173

Which of the following BEST describes the scope of risk analysis?

ANSWER

organizational requirements.

QUESTION 174

The decision as to whether a risk has been reduced to an acceptable level should be determined by:

ANSWER

Is a necessary part of management's due diligence

QUESTION 175

Which of the following is the PRIMARY reason for implementing a risk management program?

ANSWER

Process owners

QUESTION 176

Which of the following groups would be in the BEST position to perform a risk analysis for a business?

ANSWER

optimization of risk reduction efforts against cost.

QUESTION 177

A successful risk management program should lead to:

ANSWER

An electrical power outage

QUESTION 178

Which of the following risks would BEST be assessed using quantitative risk assessment techniques?

ANSWER

financial losses incurred by affected business units.

QUESTION 179

The impact of losing frame relay network connectivity for 18-24 hours should be calculated using the:

ANSWER

List of action items to mitigate risk

QUESTION 180

Which of the following is the MOST usable deliverable of an information security risk analysis?

ANSWER

Heat charts

QUESTION 181

Ongoing tracking of remediation efforts to mitigate identified risks can BEST be accomplished through the use of which of the following?

ANSWER

Chief operations officer (COO)

QUESTION 182

Who would be in the BEST position to determine the recovery point objective (RPO) for business applications?

ANSWER

Likelihood and impact

QUESTION 183

Which two components PRIMARILY must be assessed in an effective risk analysis?

ANSWER

justify selection of risk mitigation strategies.

QUESTION 184

Information security managers should use risk assessment techniques to:

ANSWER

consider both monetary value and likelihood of loss.

QUESTION 185

In assessing risk, it is MOST essential to:

ANSWER

data owners who may be impacted.

QUESTION 186

When the computer incident response team (CIRT) finds clear evidence that a hacker has penetrated the corporate network and modified customer information, an information security manager should FIRST notify:

ANSWER

Entitlement changes

QUESTION 187

Data owners are PRIMARILY responsible for establishing risk mitigation methods to address which of the following areas?

ANSWER

stated objectives are achievable.

QUESTION 188

The PRIMARY goal of a corporate risk management program is to ensure that an organization's:

ANSWER

countermeasures are proportional to risk.

QUESTION 189

It is important to classify and determine relative sensitivity of assets to ensure that:

ANSWER

determine the current level of security.

QUESTION 190

The service level agreement (SLA) for an outsourced IT function does not reflect an adequate level of protection. In this situation an information security manager should:

ANSWER

vulnerability.

QUESTION 191

An information security manager has been assigned to implement more restrictive preventive controls. By doing so, the net effect will be to PRIMARILY reduce the:

ANSWER

Calculate the value of the information or asset

QUESTION 192

When performing a quantitative risk analysis, which of the following is MOST important to estimate the potential loss?

ANSWER

map the major threats to business objectives.

QUESTION 193

Before conducting a formal risk assessment of an organization's information resources, an information security manager should FIRST:

ANSWER

the information owner.

QUESTION 194

The valuation of IT assets should be performed by:

ANSWER

minimize residual risk.

QUESTION 195

The PRIMARY objective of a risk management program is to:

ANSWER

Business manager

QUESTION 196

After completing a full IT risk assessment, who can BEST decide which mitigating controls should be implemented?

ANSWER

identify controls commensurate to risk.

QUESTION 197

The PRIMARY benefit of performing an information asset classification is to:

ANSWER

New risks detection

QUESTION 198

Which of the following is MOST essential for a risk management program to be effective?

ANSWER

Brute force attack

QUESTION 199

Which of the following attacks is BEST mitigated by utilizing strong passwords?

ANSWER

User awareness

QUESTION 200

Phishing is BEST mitigated by which of the following?

ANSWER

ensuring security measures are consistent with policy.

QUESTION 201

The security responsibility of data custodians in an organization will include:

ANSWER

business threats are constantly changing.

QUESTION 202

A security risk assessment exercise should be repeated at regular intervals because:

ANSWER

Identity business assets

QUESTION 203

Which of the following steps in conducting a risk assessment should be performed FIRST?

ANSWER

periodically testing the incident response plans.

QUESTION 204

The systems administrator did not immediately notify the security officer about a malicious attack. An information security manager could prevent this situation by:

ANSWER

Residual

QUESTION 205

Which of the following risks is represented in the risk appetite of an organization?

ANSWER

Recover)' time objective (RTO)

QUESTION 206

Which of the following would a security manager establish to determine the target for restoration of normal processing?

ANSWER

maintain residual risk at an acceptable level.

QUESTION 207

A risk management program would be expected to:

ANSWER

Feasibility

QUESTION 208

Risk assessment should be built into which of the following systems development phases to ensure that risks are addressed in a development project?

ANSWER

Business impact analysis (BIA)

QUESTION 209

Which of the following would help management determine the resources needed to mitigate a risk to the organization?

ANSWER

the cost of countermeasure outweighs the value of the asset and potential loss.

QUESTION 210

A global financial institution has decided not to take any further action on a denial of service (DoS) risk found by the risk assessment team. The MOST likely reason they made this decision is that:

ANSWER

Percent of control objectives accomplished

QUESTION 211

Which would be one of the BEST metrics an information security manager can employ to effectively evaluate the results of a security program?

ANSWER

Previous financial results

QUESTION 212

Which of the following types of information would the information security manager expect to have the LOWEST level of security protection in a large, multinational enterprise?

ANSWER

assess exposures and plan remediation.

QUESTION 213

The PRIMARY purpose of using risk analysis within a security program is to:

ANSWER

Identifying data owners

QUESTION 214

Which of the following is the PRIMARY prerequisite to implementing data classification within an organization?

ANSWER

mitigate the impact by purchasing insurance.

QUESTION 215

An online banking institution is concerned that the breach of customer personal information will have a significant financial impact due to the need to notify and compensate customers whose personal information may have been compromised. The institution determines that residual risk will always be too high and decides to:

ANSWER

Security gap analyses

QUESTION 216

What mechanisms are used to identify deficiencies that would provide attackers with an opportunity to compromise a computer system?

ANSWER

inject structured query language (SQL) statements.

QUESTION 217

A common concern with poorly written web applications is that they can allow an attacker to:

ANSWER

Cost versus benefit of additional mitigating controls

QUESTION 218

Which of the following would be of GREATEST importance to the security manager in determining whether to accept residual risk?

ANSWER

Understand the business requirements of the developer portal

QUESTION 219

A project manager is developing a developer portal and requests that the security manager assign a public IP address so that it can be accessed by in-house staff and by external consultants outside the organization's local area network (LAN). What should the security manager do FIRST?

ANSWER

Create a strong random password

QUESTION 220

A mission-critical system has been identified as having an administrative system account with attributes that prevent locking and change of privileges and name. Which would be the BEST approach to prevent successful brute forcing of the account?

ANSWER

a lack of proper input validation controls.

QUESTION 221

Attackers who exploit cross-site scripting vulnerabilities take advantage of:

ANSWER

Acceptable use policies

QUESTION 222

Which of the following would BEST address the risk of data leakage?

ANSWER

Data classification policy

QUESTION 223

A company recently developed a breakthrough technology. Since this technology could give this company a significant competitive edge, which of the following would FIRST govern how this information is to be protected?

ANSWER

Cost-benefit analysis

QUESTION 224

What is the BEST technique to determine which security controls to implement with a limited budget?

ANSWER

A risk assessment

QUESTION 225

A company's mail server allows anonymous file transfer protocol (FTP) access which could be exploited. What process should the information security manager deploy to determine the necessity for remedial action?

ANSWER

Role-based access control

QUESTION 226

Which of the following measures would be MOST effective against insider threats to confidential information?

ANSWER

recommend a risk assessment and implementation only if the residual risks are accepted.

QUESTION 227

Because of its importance to the business, an organization wants to quickly implement a technical solution which deviates from the company's policies. An information security manager should:

ANSWER

implement monitoring techniques to detect and react to potential fraud.

QUESTION 228

After a risk assessment study, a bank with global operations decided to continue doing business in certain regions of the world where identity theft is rampant. The information security manager should encourage the business to:

ANSWER

impact assessment.

QUESTION 229

The criticality and sensitivity of information assets is determined on the basis of:

ANSWER

Valuation

QUESTION 230

Which program element should be implemented FIRST in asset classification and control?

ANSWER

assets have been identified and appropriately valued.

QUESTION 231

When performing a risk assessment, the MOST important consideration is that:

ANSWER

the appropriate level of protection to the asset.

QUESTION 232

The MAIN reason why asset classification is important to a successful information security program is because classification determines:

ANSWER

reduce risk to an acceptable level.

QUESTION 233

The BEST strategy for risk management is to:

ANSWER

Intrinsic value of the data stored on the equipment

QUESTION 234

Which of the following would be the MOST important factor to be considered in the loss of mobile equipment with unencrypted data?

ANSWER

Perform a gap analysis.

QUESTION 235

An organization has to comply with recently published industry regulatory requirementsÑ compliance that potentially has high implementation costs. What should the information security manager do FIRST?

ANSWER

Total cost of ownership (TCO)

QUESTION 236

Which of the following would be MOST relevant to include in a cost-benefit analysis of a two-factor authentication system?

ANSWER

the test results of intended objectives.

QUESTION 237

One way to determine control effectiveness is by determining:

ANSWER

Misconfiguration and missing updates

QUESTION 238

What does a network vulnerability assessment intend to identify?

ANSWER

Data owner

QUESTION 239

Who is responsible for ensuring that information is classified?

ANSWER

accepted.

QUESTION 240

After a risk assessment, it is determined that the cost to mitigate the risk is much greater than the benefit to be derived. The information security manager should recommend to business management that the risk be:

ANSWER

An explanation of the incident and corrective action taterm-276ken

QUESTION 241

When a significant security breach occurs, what should be reported FIRST to senior management?

ANSWER

the risk is justified by the benefit.

QUESTION 242

The PRIMARY reason for initiating a policy exception process is when:

ANSWER

Requirements of data owners

QUESTION 243

Which of (lie following would be the MOST relevant factor when defining the information classification policy?

ANSWER

focus on key controls.

QUESTION 244

To determine the selection of controls required to meet business objectives, an information security manager should:

ANSWER

head of the sales department.

QUESTION 245

The MOST appropriate owner of customer data stored in a central database, used only by an organization's sales department, would be the:

ANSWER

identify systems and processes that contain privacy components.

QUESTION 246

In assessing the degree to which an organization may be affected by new privacy legislation, information security management should FIRST:

ANSWER

on a continuous basis.

QUESTION 247

Risk assessment is MOST effective when performed:

ANSWER

The risk environment is constantly changing.

QUESTION 248

Which of the following is the MAIN reason for performing risk assessment on a continuous basis'?

ANSWER

Identify the vulnerable systems and apply compensating controls

QUESTION 249

There is a time lag between the time when a security vulnerability is first published, and the time when a patch is delivered. Which of the following should be carried out FIRST to mitigate the risk during this time period?

ANSWER

Penetration testing

QUESTION 250

Which of the following security activities should be implemented in the change management process to identify key vulnerabilities introduced by changes?

ANSWER

Countermeasure cost-benefit analysis

QUESTION 251

Which of the following techniques MOST clearly indicates whether specific risk-reduction controls should be implemented?

ANSWER

mitigating the risk.

QUESTION 252

An organization has decided to implement additional security controls to treat the risks of a new process. This is an example of:

ANSWER

Owner

QUESTION 253

Which of the following roles is PRIMARILY responsible for determining the information classification levels for a given information asset?

ANSWER

defining the level of access controls.

QUESTION 254

The PRIMARY reason for assigning classes of sensitivity and criticality to information resources is to provide a basis for:

ANSWER

Gap analysis

QUESTION 255

An organization is already certified to an international security standard. Which mechanism would BEST help to further align the organization with other data security regulatory requirements as per new business needs?

ANSWER

Possible scenarios with threats and impacts

QUESTION 256

When performing a qualitative risk analysis, which of the following will BEST produce reliable results?

ANSWER

Participation by all members of the organization

QUESTION 257

Which of the following is the BEST method to ensure the overall effectiveness of a risk management program?

ANSWER

facilitate a thorough review of all IT-related risks on a periodic basis.

QUESTION 258

The MOST effective use of a risk register is to:

ANSWER

Conduct a risk assessment

QUESTION 259

After obtaining commitment from senior management, which of the following should be completed NEXT when establishing an information security program?

ANSWER

Downtime tolerance, resources and criticality

QUESTION 260

Which of the following are the essential ingredients of a business impact analysis (B1A)?

ANSWER

managing risks to an acceptable level, commensurate with goals and objectives.

QUESTION 261

A risk management approach to information protection is:

ANSWER

Transfer the risk.

QUESTION 262

Which of the following is the MOST effective way to treat a risk such as a natural disaster that has a low probability and a high impact level?

ANSWER

Conducting a business impact analysis (BIA).

QUESTION 263

To ensure that payroll systems continue on in an event of a hurricane hitting a data center, what would be the FIRS T crucial step an information security manager would take in ensuring business continuity planning?

ANSWER

support the business objectives of the company by providing security-related support services.

QUESTION 264

An information security organization should PRIMARILY:

ANSWER

minimizing operational impacts.

QUESTION 265

When implementing security controls, an information security manager must PRIMARILY focus on:

ANSWER

an acceptable level based on organizational risk tolerance.

QUESTION 266

All risk management activities are PRIMARILY designed to reduce impacts to:

ANSWER

Business owner

QUESTION 267

After assessing and mitigating the risks of a web application, who should decide on the acceptance of residual application risks?

ANSWER

mitigate impact.

QUESTION 268

The purpose of a corrective control is to:

ANSWER

Basing the information security infrastructure on risk assessment

QUESTION 269

Which of the following is the MOST important requirement for setting up an information security infrastructure for a new system?

ANSWER

re-assessed periodically since the risk can be escalated to an unacceptable level due to revised conditions.

QUESTION 270

Previously accepted risk should be:

ANSWER

immediately advise senior management of the elevated risk.

QUESTION 271

An information security manager is advised by contacts in law enforcement that there is evidence that his/ her company is being targeted by a skilled gang of hackers known to use a variety of techniques, including social engineering and network penetration. The FIRST step that the security manager should take is to:

ANSWER

Asset identification and valuation

QUESTION 272

Which of the following steps should be performed FIRST in the risk assessment process?

ANSWER

Challenge/response mechanism

QUESTION 273

Which of the following authentication methods prevents authentication replay?

ANSWER

A new risk assessment should be performed.

QUESTION 274

An organization has a process in place that involves the use of a vendor. A risk assessment was completed during the development of the process. A year after the implementation a monetary decision has been made to use a different vendor. What, if anything, should occur?

ANSWER

Steering committee

QUESTION 275

Who can BEST advocate the development of and ensure the success of an information security program?

ANSWER

Virtual private network (VPN)

QUESTION 276

Which of the following BEST ensures that information transmitted over the Internet will remain confidential?

ANSWER

Definition tables

QUESTION 277

The effectiveness of virus detection software is MOST dependent on which of the following?

ANSWER

Role-based

QUESTION 278

Which of the following is the MOST effective type of access control?

ANSWER

Mail relay

QUESTION 279

Which of the following devices should be placed within a DMZ?

ANSWER

on a screened subnet.

QUESTION 280

An intrusion detection system should be placed:

ANSWER

permit traffic load balancing.

QUESTION 281

The BEST reason for an organization to have two discrete firewalls connected directly to the Internet and to the same DMZ would be to:

ANSWER

on a screened subnet.

QUESTION 282

An extranet server should be placed:

ANSWER

reported incidents.

QUESTION 283

Which of the following is the BEST metric for evaluating the effectiveness of security awareness twining? The number of:

ANSWER

focus on business-critical information.

QUESTION 284

Security monitoring mechanisms should PRIMARILY:

ANSWER

Computer-based certification training (CBT)

QUESTION 285

Which of the following is the BEST method for ensuring that security procedures and guidelines are known and understood?

ANSWER

service level agreement (SLA).

QUESTION 286

When contracting with an outsourcer to provide security administration, the MOST important contractual element is the:

ANSWER

Ratio of false positives to false negatives

QUESTION 287

Which of the following is the BEST metric for evaluating the effectiveness of an intrusion detection mechanism?

ANSWER

Change management

QUESTION 288

Which of the following is MOST effective in preventing weaknesses from being introduced into existing production systems?

ANSWER

Patch management

QUESTION 289

Which of the following is MOST effective in preventing security weaknesses in operating systems?

ANSWER

calculating the residual risk.

QUESTION 290

When a proposed system change violates an existing security standard, the conflict would be BEST resolved by:

ANSWER

Steering committee

QUESTION 291

Who can BEST approve plans to implement an information security governance framework?

ANSWER

Role-based access controls

QUESTION 292

Which of the following is the MOST effective solution for preventing internal users from modifying sensitive and classified information?

ANSWER

Embedded digital signature

QUESTION 293

Which of the following is generally used to ensure that information transmitted over the Internet is authentic and actually transmitted by the named sender?

ANSWER

Daily

QUESTION 294

Which of the following is the MOST appropriate frequency for updating antivirus signature files for antivirus software on production servers?

ANSWER

Web server

QUESTION 295

Which of the following devices should be placed within a demilitarized zone (DMZ )?

ANSWER

Domain boundary

QUESTION 296

On which of the following should a firewall be placed?

ANSWER

internal network.

QUESTION 297

An intranet server should generally be placed on the:

ANSWER

two-factor authentication.

QUESTION 298

Access control to a sensitive intranet application by mobile users can BEST be implemented through:

ANSWER

Centralizing security management

QUESTION 299

When application-level security controlled by business process owners is found to be poorly managed, which of the following could BEST improve current practices?

ANSWER

Increase in reported incidents

QUESTION 300

Security awareness training is MOST likely to lead to which of the following?

ANSWER

consider possible impact of a security breach.

QUESTION 301

The information classification scheme should:

ANSWER

Give a dummy password over the telephone set for immediate expiration

QUESTION 302

Which of the following is the BEST method to provide a new user with their initial password for email system access?

ANSWER

key business process owners.

QUESTION 303

An information security program should be sponsored by:

ANSWER

Service levels

QUESTION 304

Which of the following is the MOST important item to include when developing web hosting agreements with third-party providers?

ANSWER

number of attacks blocked.

QUESTION 305

The BEST metric for evaluating the effectiveness of a firewall is the:

ANSWER

Patch management

QUESTION 306

Which of the following ensures that newly identified security weaknesses in an operating system are mitigated in a timely fashion?

ANSWER

reduces overall administrative workload.

QUESTION 307

The MAIN advantage of implementing automated password synchronization is that it:

ANSWER

Balanced scorecard

QUESTION 308

Which of the following tools is MOST appropriate to assess whether information security governance objectives are being met?

ANSWER

Change management

QUESTION 309

Which of the following is MOST effective in preventing the introduction of a code modification that may reduce the security of a critical business application?

ANSWER

Compensate for not installing the patch with mitigating controls

QUESTION 310

An operating system (OS) noncritical patch to enhance system security cannot be applied because a critical application is not compatible with the change. Which of the following is the BEST solution?

ANSWER

Senior management sponsorship

QUESTION 311

Which of the following is MOST important to the success of an information security program?

ANSWER

Executive management commitment

QUESTION 312

Which of the following is MOST important for a successful information security program?

ANSWER

Screened subnets

QUESTION 313

Which of the following is the MOST effective solution for preventing individuals external to the organization from modifying sensitive information on a corporate database?

ANSWER

Two-factor authentication

QUESTION 314

Which of the following technologies is utilized to ensure that an individual connecting to a corporate internal network over the Internet is not an intruder masquerading as an authorized user?

ANSWER

Whenever important security patches are released

QUESTION 315

What is an appropriate frequency for updating operating system (OS) patches on production servers?

ANSWER

Application server

QUESTION 316

A border router should be placed on which of the following?

ANSWER

Demilitarized zone (DMZ)

QUESTION 317

An e-commerce order fulfillment web server should generally be placed on which of the following?

ANSWER

data encryption.

QUESTION 318

Secure customer use of an e-commerce application can BEST be accomplished through:

ANSWER

Strict controls on input fields

QUESTION 319

What is the BEST defense against a Structured Query Language (SQL) injection attack?

ANSWER

Tuning

QUESTION 320

Which of the following is the MOST important consideration when implementing an intrusion detection system (IDS)?

ANSWER

Encryption

QUESTION 321

Which of the following is the MOST important consideration when securing customer credit card data acquired by a point-of-sale (POS) cash register?

ANSWER

Establish predetermined automatic expiration dates

QUESTION 322

Which of the following practices is BEST to remove system access for contractors and other temporary users when it is no longer required?

ANSWER

key business process owners.

QUESTION 323

Primary direction on the impact of compliance with new regulatory requirements that may lead to major application system changes should be obtained from the:

ANSWER

System overhead

QUESTION 324

Which of the following is the MOST important item to consider when evaluating products to monitor security across the enterprise?

ANSWER

Do not interrupt production processes

QUESTION 325

Which of the following is the MOST important guideline when using software to scan for security exposures within a corporate network?

ANSWER

Change management

QUESTION 326

Which of the following BEST ensures that modifications made to in-house developed business applications do not introduce new security exposures?

ANSWER

helps ensure that communications are secure.

QUESTION 327

The advantage of Virtual Private Network (VPN) tunneling for remote users is that it:

ANSWER

Strong encryption

QUESTION 328

Which of the following is MOST effective for securing wireless networks as a point of entry into a corporate network?

ANSWER

Security awareness training

QUESTION 329

Which of the following is MOST effective in protecting against the attack technique known as phishing?

ANSWER

Access control should fall back to no synchronized mode

QUESTION 330

When a newly installed system for synchronizing passwords across multiple systems and platforms abnormally terminates without warning, which of the following should automatically occur FIRST?

ANSWER

System integrity may be affected

QUESTION 331

Which of the following is the MOST important risk associated with middleware in a client-server environment?

ANSWER

Security in storage and transmission of sensitive data

QUESTION 332

An outsource service provider must handle sensitive customer information. Which of the following is MOST important for an information security manager to know?

ANSWER

Safeguards over keys

QUESTION 333

Which of the following security mechanisms is MOST effective in protecting classified data that have been encrypted to prevent disclosure and transmission outside the organization's network?

ANSWER

Encryption

QUESTION 334

In the process of deploying a new e-mail system, an information security manager would like to ensure the confidentiality of messages while in transit. Which of the following is the MOST appropriate method to ensure data confidentiality in a new e-mail system implementation?

ANSWER

generate false alarms from varying user or system actions.

QUESTION 335

The MOST important reason that statistical anomaly-based intrusion detection systems (slat IDSs) are less commonly used than signature-based IDSs, is that stat IDSs:

ANSWER

performance of the information security program.

QUESTION 336

An information security manager uses security metrics to measure the:

ANSWER

customize the content to the target audience.

QUESTION 337

The MOST important success factor to design an effective IT security awareness program is to:

ANSWER

Connect through an IPSec VPN

QUESTION 338

Which of the following practices completely prevents a man-in-the-middle (MitM) attack between two hosts?

ANSWER

Certificate-based authentication of web client

QUESTION 339

Which of the following features is normally missing when using Secure Sockets Layer (SSL) in a web browser?

ANSWER

Secure Sockets Layer (SSL).

QUESTION 340

The BEST protocol to ensure confidentiality of transmissions in a business-to-customer (B2C) financial web application is:

ANSWER

confidentiality and nonrepudiation.

QUESTION 341

A message* that has been encrypted by the sender's private key and again by the receiver's public key achieves:

ANSWER

Trojan

QUESTION 342

When a user employs a client-side digital certificate to authenticate to a web server through Secure Socket Layer (SSI.), confidentiality is MOST vulnerable to which of the following?

ANSWER

Security compliant servers trend report

QUESTION 343

Which of the following is the MOST relevant metric to include in an information security quarterly report to the executive committee?

ANSWER

the minimum acceptable security to be implemented.

QUESTION 344

It is important to develop an information security baseline because it helps to define:

ANSWER

Public key infrastructure (PKI)

QUESTION 345

Which of the following BEST provides message integrity, sender identity authentication and nonrepudiation?

ANSWER

Regular review of access control lists

QUESTION 346

Which of the following controls is MOST effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices?

ANSWER

evaluate a balanced business scorecard.

QUESTION 347

To BEST improve the alignment of the information security objectives in an organization, the chief information security officer (CISO) should:

ANSWER

The key objectives of the security program

QUESTION 348

What is the MOST important item to be included in an information security policy?

ANSWER

all personnel.

QUESTION 349

In an organization, information systems security is the responsibility of:

ANSWER

define high-level business security requirements.

QUESTION 350

An organization without any formal information security program that has decided to implement information security best practices should FIRST:

ANSWER

Cost of achieving control objectives

QUESTION 351

When considering the value of assets, which of the following would give the information security manager the MOST objective basis for measurement of value delivery in information security governance?

ANSWER

Percentage of critical assets with budgeted remedial

QUESTION 352

Which of the following would be the BEST metric for the IT risk management process?

ANSWER

Business continuity management

QUESTION 353

Which of the following is a key area of the ISO 27001 framework?

ANSWER

protect information assets and resources.

QUESTION 354

The MAIN goal of an information security strategic plan is to:

ANSWER

Encrypting first by sender's private key and second by receiver's public key

QUESTION 355

Which of the following, using public key cryptography, ensures authentication, confidentiality and nonrepudiation of a message?

ANSWER

rebuild the system from the original installation medium.

QUESTION 356

The main mail server of a financial institution has been compromised at the superuser level; the only way to ensure the system is secure would be to:

ANSWER

verify the decision with the business units.

QUESTION 357

The IT function has declared that, when putting a new application into production, it is not necessary to update the business impact analysis (BIA) because it does not produce modifications in the business processes. The information security manager should:

ANSWER

Traffic sniffing

QUESTION 358

A risk assessment study carried out by an organization noted that there is no segmentation of the local area network (LAN). Network segmentation would reduce the potential impact of which of the following?

ANSWER

disruption of Internet access.

QUESTION 359

The PRIMARY objective of an Internet usage policy is to prevent:

ANSWER

broken authentication.

QUESTION 360

An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. The vulnerability identified is:

ANSWER

Design

QUESTION 361

A test plan to validate the security controls of a new system should be developed during which phase of the project?

ANSWER

periodically auditing.

QUESTION 362

The MOST effective way to ensure that outsourced service providers comply with the organization's information security policy would be:

ANSWER

a strong authentication.

QUESTION 363

In order to protect a network against unauthorized external connections to corporate systems, the information security manager should BEST implement:

ANSWER

contribute cost-effective expertise not available internally.

QUESTION 364

The PRIMARY driver to obtain external resources to execute the information security program is that external resources can:

ANSWER

Planning

QUESTION 365

Priority should be given to which of the following to ensure effective implementation of information security governance?

ANSWER

provide a high assurance of identity.

QUESTION 366

The MAIN reason for deploying a public key infrastructure (PKI) when implementing an information security program is to:

ANSWER

Protective switch covers

QUESTION 367

Which of the following controls would BEST prevent accidental system shutdown from the console or operations area?

ANSWER

Tool for measuring effectiveness

QUESTION 368

Which of the following is the MOST important reason why information security objectives should be defined?

ANSWER

Encryption

QUESTION 369

What is the BEST policy for securing data on mobile universal serial bus (USB) drives?

ANSWER

Encrypted hard drives

QUESTION 370

Which of the following would BEST protect an organization's confidential data stored on a laptop computer from unauthorized access?

ANSWER

Reducing the human risk

QUESTION 371

What is the MOST important reason for conducting security awareness programs throughout an organization?

ANSWER

Requirements development

QUESTION 372

At what stage of the applications development process would encryption key management initially be addressed?

ANSWER

messages displayed at every logon.

QUESTION 373

The MOST effective way to ensure network users are aware of their responsibilities to comply with an organization's security requirements is:

ANSWER

Encrypt the data being transmitted

QUESTION 374

Which of the following would be the BEST defense against sniffing?

ANSWER

rely on the extent to which the certificate authority (CA) is trusted.

QUESTION 375

A digital signature using a public key infrastructure (PKI) will:

ANSWER

to u higher false reject rate (FRR).

QUESTION 376

When configuring a biometric access control system that protects a high-security data center, the system's sensitivity level should be set:

ANSWER

Using public key infrastructure (PKI) encryption

QUESTION 377

Which of the following is the BEST method to securely transfer a message?

ANSWER

Develop the security plan.

QUESTION 378

Which of the following would be the FIRST step in establishing an information security program?

ANSWER

Role-based

QUESTION 379

An organization has adopted a practice of regular staff rotation to minimize the risk of fraud and encourage crosstraining. Which type of authorization policy would BEST address this practice?

ANSWER

appropriate controls are included.

QUESTION 380

Which of the following is the MOST important reason for an information security review of contracts? To help ensure that:

ANSWER

Two-factor authentication

QUESTION 381

For virtual private network (VPN) access to the corporate network, the information security manager is requiring strong authentication. Which of the following is the strongest method to ensure that logging onto the network is secure?

ANSWER

Creating a hash of the file, then comparing the file hashes

QUESTION 382

Which of the following guarantees that data in a file have not changed?

ANSWER

Use a Wi-Fi Protected Access (WPA2) protocol

QUESTION 383

Which of the following mechanisms is the MOST secure way to implement a secure wireless network?

ANSWER

An intrusion prevention system (IPS)

QUESTION 384

Which of the following devices could potentially stop a Structured Query Language (SQL) injection attack?

ANSWER

digital signatures.

QUESTION 385

Nonrepudiation can BEST be ensured by using:

ANSWER

establish security baselines.

QUESTION 386

The BEST way to ensure that security settings on each platform are in compliance with information security policies and procedures is to:

ANSWER

User

QUESTION 387

A web-based business application is being migrated from test to production. Which of the following is the MOST important management signoff for this migration?

ANSWER

perform periodic reviews for compliance.

QUESTION 388

The BEST way to ensure that information security policies are followed is to:

ANSWER

system data owner.

QUESTION 389

The MOST appropriate individual to determine the level of information security needed for a specific business application is the:

ANSWER

Conducting security awareness programs

QUESTION 390

Which of the following will MOST likely reduce the chances of an unauthorized individual gaining access to computing resources by pretending to be an authorized individual needing to have his, her password reset?

ANSWER

Security awareness campaigns

QUESTION 391

Which of the following is the MOST likely to change an organization's culture to one that is more security conscious?

ANSWER

Perform periodic reviews of the service provider.

QUESTION 392

The BEST way to ensure that an external service provider complies with organizational security policies is to:

ANSWER

validated to ensure its authenticity.

QUESTION 393

When an emergency security patch is received via electronic mail, the patch should FIRST be:

ANSWER

Changing access rules

QUESTION 394

In a well-controlled environment, which of the following activities is MOST likely to lead to the introduction of weaknesses in security software?

ANSWER

More incidents are being reported

QUESTION 395

Which of the following is the BEST indicator that security awareness training has been effective?

ANSWER

Penetration attempts investigated

QUESTION 396

Which of the following metrics would be the MOST useful in measuring how well information security is monitoring violation logs?

ANSWER

emergency change requests.

QUESTION 397

Which of the following change management activities would be a clear indicator that normal operational procedures require examination? A high percentage of:

ANSWER

User

QUESTION 398

Which of the following is the MOST important management signoff for migrating an order processing system from a test environment to a production environment?

ANSWER

goals and objectives are clearly defined.

QUESTION 399

Prior to having a third party perform an attack and penetration test against an organization, the MOST important action is to ensure that:

ANSWER

conduct an impact analysis to quantify the risks.

QUESTION 400

When a departmental system continues to be out of compliance with an information security policy's password strength requirements, the BEST action to undertake is to:

ANSWER

Management support

QUESTION 401

Which of the following is MOST important to the successful promotion of good security management practices?

ANSWER

Locally managed file server

QUESTION 402

Which of the following environments represents the GREATEST risk to organizational security?

ANSWER

digital signatures.

QUESTION 403

Nonrepudiation can BEST be assured by using:

ANSWER

role-based access controls.

QUESTION 404

Of the following, the BEST method for ensuring that temporary employees do not receive excessive access rights is:

ANSWER

Configuration management

QUESTION 405

Which of the following areas is MOST susceptible to the introduction of security weaknesses?

ANSWER

organizational needs.

QUESTION 406

Security policies should be aligned MOST closely with:

ANSWER

simulate an attack and review IDS performance.

QUESTION 407

The BEST way to determine if an anomaly-based intrusion detection system (IDS) is properly installed is to:

ANSWER

various infrastructure changes are made.

QUESTION 408

The BEST time to perform a penetration test is after:

ANSWER

periodic awareness training.

QUESTION 409

Successful social engineering attacks can BEST be prevented through:

ANSWER

Install a honeypot on the network

QUESTION 410

What is the BEST way to ensure that an intruder who successfully penetrates a network will be detected before significant damage is inflicted?

ANSWER

Operating system (OS) security patches have not been applied

QUESTION 411

Which of the following presents the GREATEST threat to the security of an enterprise resource planning (ERP) system?

ANSWER

Conducting periodic security awareness programs

QUESTION 412

In a social engineering scenario, which of the following will MOST likely reduce the likelihood of an unauthorized individual gaining access to computing resources?

ANSWER

Security-steering committees

QUESTION 413

Which of the following will BEST ensure that management takes ownership of the decision making process for information security?

ANSWER

Process owner

QUESTION 414

Which of the following is the MOST appropriate individual to implement and maintain the level of information security needed for a specific business application?

ANSWER

Perform periodic security reviews of the contractors

QUESTION 415

What is the BEST way to ensure that contract programmers comply with organizational security policies?

ANSWER

Backing up files

QUESTION 416

Which of the following activities is MOST likely to increase the difficulty of totally eradicating malicious code that is not immediately detected?

ANSWER

before they have access to data.

QUESTION 417

Security awareness training should be provided to new employees:

ANSWER

Trace OS patch logs to change control requests

QUESTION 418

What is the BEST method to verify that all security patches applied to servers were properly documented?

ANSWER

address specific groups and roles.

QUESTION 419

A security awareness program should:

ANSWER

influence employee behavior.

QUESTION 420

The PRIMARY objective of security awareness is to:

ANSWER

Effective termination procedures

QUESTION 421

Which of the following will BEST protect against malicious activity by a former employee?

ANSWER

Network mapping

QUESTION 422

Which of the following represents a PRIMARY area of interest when conducting a penetration test?

ANSWER

Support of business objectives

QUESTION 423

The return on investment of information security can BEST be evaluated through which of the following?

ANSWER

avoid granting system administration roles.

QUESTION 424

To help ensure that contract personnel do not obtain unauthorized access to sensitive information, an information security manager should PRIMARILY:

ANSWER

be straightforward and easy to understand.

QUESTION 425

Information security policies should:

ANSWER

Perform periodic penetration testing.

QUESTION 426

Which of the following is the BEST way to ensure that a corporate network is adequately secured against external attack?

ANSWER

User passwords are encoded but not encrypted

QUESTION 427

Which of the following presents the GREATEST exposure to internal attack on a network?

ANSWER

Standards

QUESTION 428

Which of the following provides the linkage to ensure that procedures are correctly aligned with information security policy requirements?

ANSWER

IT management and key business process owners

QUESTION 429

Which of the following are the MOST important individuals to include as members of an information security steering committee?

ANSWER

ensure that controls operate as required.

QUESTION 430

Security audit reviews should PRIMARILY:

ANSWER

Out-of-band channels

QUESTION 431

Which of the following is the MOST appropriate method to protect a password that opens a confidential file?

ANSWER

Mandatory

QUESTION 432

What is the MOST effective access control method to prevent users from sharing files with unauthorized users?

ANSWER

New attack methods will be missed

QUESTION 433

Which of the following is an inherent weakness of signature-based intrusion detection systems?

ANSWER

Determining the level of application security required

QUESTION 434

Data owners are normally responsible for which of the following?

ANSWER

System user

QUESTION 435

Which of the following is the MOST appropriate individual to ensure that new exposures have not been introduced into an existing application during the change management process?

ANSWER

Enable system-enforced password configuration

QUESTION 436

What is the BEST way to ensure users comply with organizational security requirements for password complexity?

ANSWER

Initially load the patches on a test machine

QUESTION 437

Which of the following is the MOST appropriate method for deploying operating system (OS) patches to production application servers?

ANSWER

Security incidents are investigated within five business days

QUESTION 438

Which of the following would present the GREATEST risk to information security?

ANSWER

enable steady improvement.

QUESTION 439

The PRIMARY reason for using metrics to evaluate information security is to:

ANSWER

Periodically perform penetration tests

QUESTION 440

What is the BEST method to confirm that all firewall rules and router configuration settings are adequate?

ANSWER

A quantitative evaluation to ensure user comprehension

QUESTION 441

Which of the following is MOST important for measuring the effectiveness of a security awareness program?

ANSWER

Establish clear rules of engagement

QUESTION 442

Which of the following is the MOST important action to take when engaging third-party consultants to conduct an attack and penetration test?

ANSWER

Restrict the available drive allocation on all PCs

QUESTION 443

Which of the following will BEST prevent an employee from using a USB drive to copy files from desktop computers?

ANSWER

Number of administrators

QUESTION 444

Which of the following is the MOST important area of focus when examining potential security compromise of a new wireless network?

ANSWER

be updated frequently as new software is released.

QUESTION 445

Good information security procedures should:

ANSWER

may be quarantined by mail filters.

QUESTION 446

What is the MAIN drawback of e-mailing password-protected zip files across the Internet? They:

ANSWER

Set up firewall rules restricting network traffic from that location

QUESTION 447

A major trading partner with access to the internal network is unwilling or unable to remediate serious information security exposures within its environment. Which of the following is the BEST recommendation?

ANSWER

define the circumstances where cryptography should be used.

QUESTION 448

Documented standards/procedures for the use of cryptography across the enterprise should PRIMARILY:

ANSWER

The number of false positives increases

QUESTION 449

Which of the following is the MOST immediate consequence of failing to tune a newly installed intrusion detection system (IDS) with the threshold set to a low value?

ANSWER

Documentation is completed with approval soon after the change

QUESTION 450

What is the MOST appropriate change management procedure for the handling of emergency program changes?

ANSWER

Security steering committee

QUESTION 451

Who is ultimately responsible for ensuring that information is categorized and that protective measures are taken?

ANSWER

authorized.

QUESTION 452

The PRIMARY focus of the change control process is to ensure that changes are:

ANSWER

Meet with stakeholders

QUESTION 453

An information security manager has been asked to develop a change control process. What is the FIRST thing the information security manager should do?

ANSWER

Enable access through a separate device that requires adequate authentication

QUESTION 454

A critical device is delivered with a single user and password that is required to be shared for multiple users to access the device. An information security manager has been tasked with ensuring all access to the device is authorized. Which of the following would be the MOST efficient means to accomplish this?

ANSWER

IT security policy

QUESTION 455

Which of the following documents would be the BES T reference to determine whether access control mechanisms are appropriate for a critical application?

ANSWER

The right to conduct independent security reviews

QUESTION 456

Which of the following is the MOST important process that an information security manager needs to negotiate with an outsource service provider?

ANSWER

Awareness training

QUESTION 457

Which resource is the MOST effective in preventing physical access tailgating/piggybacking?

ANSWER

implement role-based access control in the application.

QUESTION 458

In business critical applications, where shared access to elevated privileges by a small group is necessary, the BEST approach to implement adequate segregation of duties is to:

ANSWER

data owner.

QUESTION 459

In business-critical applications, user access should be approved by the:

ANSWER

testing time window prior to deployment.

QUESTION 460

In organizations where availability is a primary concern, the MOST critical success factor of the patch management procedure would be the:

ANSWER

operational units.

QUESTION 461

To ensure that all information security procedures are functional and accurate, they should be designed with the involvement of:

ANSWER

Meet with data owners to understand business needs

QUESTION 462

An information security manager reviewed the access control lists and observed that privileged access was granted to an entire department. Which of the following should the information security manager do FIRST?

ANSWER

the total cost of security is increased.

QUESTION 463

When security policies are strictly enforced, the initial impact is that:

ANSWER

an effective control over connectivity and continuity.

QUESTION 464

A business partner of a factory has remote read-only access to material inventory to forecast future acquisition orders. An information security manager should PRIMARILY ensure that there is:

ANSWER

A clearly stated definition of scope

QUESTION 465

Which of the following should be in place before a black box penetration test begins?

ANSWER

Easy-to-read and compelling information

QUESTION 466

What is the MOST important element to include when developing user security awareness material?

ANSWER

Top-down approach

QUESTION 467

What is the MOST important success factor in launching a corporate information security awareness program?

ANSWER

Merging with another organization

QUESTION 468

Which of the following events generally has the highest information security impact?

ANSWER

IT senior management.

QUESTION 469

The configuration management plan should PRIMARILY be based upon input from:

ANSWER

Competitions and rewards for compliance

QUESTION 470

Which of the following is the MOST effective, positive method to promote security awareness?

ANSWER

key controls identified in risk assessments.

QUESTION 471

An information security program should focus on:

ANSWER

Finance department management

QUESTION 472

Who should determine the appropriate classification of accounting ledger data located on a database server and maintained by a database administrator in the IT department?

ANSWER

Theft of a Research and Development laptop

QUESTION 473

Which of the following would be the MOST significant security risk in a pharmaceutical institution?

ANSWER

The program's governance oversight mechanisms

QUESTION 474

Which of the following is the BEST tool to maintain the currency and coverage of an information security program within an organization?

ANSWER

Capability maturity model (CMM)

QUESTION 475

Which of the following would BEST assist an information security manager in measuring the existing level of development of security processes against their desired state?

ANSWER

Information security manager

QUESTION 476

Who is responsible for raising awareness of the need for adequate funding for risk action plans?

ANSWER

independent trusted source.

QUESTION 477

Managing the life cycle of a digital certificate is a role of a(n):

ANSWER

User acceptance

QUESTION 478

Which of the following would be MOST critical to the successful implementation of a biometric authentication system?

ANSWER

Inclusion as a required step in the system life cycle process

QUESTION 479

Change management procedures to ensure that disaster recovery/business continuity plans are kept up-to-date can be BEST achieved through which of the following?

ANSWER

service level agreements may not otherwise be met.

QUESTION 480

When a new key business application goes into production, the PRIMARY reason to update relevant business impact analysis (BIA) and business continuity/disaster recovery plans is because:

ANSWER

Service level agreements (SLAs)

QUESTION 481

To reduce the possibility of service interruptions, an entity enters into contracts with multiple Internet service providers (ISPs). Which of the following would be the MOS T important item to include?

ANSWER

log all of the programmers' activity for review by supervisor.

QUESTION 482

To mitigate a situation where one of the programmers of an application requires access to production data, the information security manager could BEST recommend to.

ANSWER

are stated in the contract.

QUESTION 483

Before engaging outsourced providers, an information security manager should ensure that the organization's data classification requirements:

ANSWER

One rule may override another rule in the chain and create a loophole

QUESTION 484

What is the GREATEST risk when there is an excessive number of firewall rules?

ANSWER

Biometric lock

QUESTION 485

Which of the following would be the MOST appropriate physical security solution for the main entrance to a data center"?

ANSWER

Ensure consistency of activities to provide a more stable environment

QUESTION 486

What is the GREATEST advantage of documented guidelines and operating procedures from a security perspective?

ANSWER

Ensure all logical access is removed

QUESTION 487

What is the BEST way to ensure data protection upon termination of employment?

ANSWER

processes are repeatable and sustainable.

QUESTION 488

The MOST important reason for formally documenting security procedures is to ensure:

ANSWER

Restrict access to a need-to-know basis

QUESTION 489

Which of the following is the BEST approach for an organization desiring to protect its intellectual property?

ANSWER

Systems programmer

QUESTION 490

The "separation of duties" principle is violated if which of the following individuals has update rights to the database access control list (ACL)?

ANSWER

Restrict account access to read only

QUESTION 491

An account with full administrative privileges over a production file is found to be accessible by a member of the software development team. This account was set up to allow the developer to download nonsensitive production data for software testing purposes. The information security manager should recommend which of the following?

ANSWER

Publish security guidance for customers

QUESTION 492

Which would be the BEST recommendation to protect against phishing attacks?

ANSWER

The monthly service level statistics indicate a minimal impact from security issues.

QUESTION 493

Which of the following is the BEST indicator that an effective security control is built into an organization?

ANSWER

Establish a virtual security team from competent employees across the company

QUESTION 494

What is the BEST way to alleviate security team understaffing while retaining the capability in house?

ANSWER

implement the security baselines to establish information security best practices.

QUESTION 495

An information security manager wishing to establish security baselines would:

ANSWER

policy.

QUESTION 496

Requiring all employees and contractors to meet personnel security/suitability requirements commensurate with their position sensitivity level and subject to personnel screening is an example of a security:

ANSWER

methodology used in the assessment.

QUESTION 497

An organization's information security manager has been asked to hire a consultant to help assess the maturity level of the organization's information security management. The MOST important element of the request for proposal (RI P) is the:

ANSWER

assess the problems and institute rollback procedures, if needed.

QUESTION 498

Several business units reported problems with their systems after multiple security patches were deployed. The FIRST step in handling this problem would be to:

ANSWER

access control matrix.

QUESTION 499

When defining a service level agreement (SLA) regarding the level of data confidentiality that is handled by a third-party service provider, the BEST indicator of compliance would be the:

ANSWER

sustaining the organization's security posture.

QUESTION 500

The PRIMARY reason for involving information security at each stage in the systems development life cycle (SDLC) is to identify the security implications and potential solutions required for:

ANSWER

incidents may have a high impact and frequency

QUESTION 501

The implementation of continuous monitoring controls is the BEST option where:

ANSWER

Security code reviews for the entire application

QUESTION 502

A third party was engaged to develop a business application. Which of the following would an information security manager BEST test for the existence of back doors?

ANSWER

source routing.

QUESTION 503

An information security manager reviewing firewall rules will be MOST concerned if the firewall allows:

ANSWER

User education and training

QUESTION 504

What is the MOS T cost-effective means of improving security awareness of staff personnel?

ANSWER

Awareness training

QUESTION 505

Which of the following is the MOST effective at preventing an unauthorized individual from following an authorized person through a secured entrance (tailgating or piggybacking)?

ANSWER

mapping to business needs.

QUESTION 506

Data owners will determine what access and authorizations users will have by:

ANSWER

Increased reporting of security incidents to the incident response function

QUESTION 507

Which of the following is the MOST likely outcome of a well-designed information security awareness course?

ANSWER

Review of various security models

QUESTION 508

Which item would be the BEST to include in the information security awareness training program for new general staff employees?

ANSWER

measuring processes and providing feedback.

QUESTION 509

A critical component of a continuous improvement program for information security is:

ANSWER

report significant security risks.

QUESTION 510

The management staff of an organization that does not have a dedicated security function decides to use its IT manager to perform a security review. The MAIN job requirement in this arrangement is that the IT manager

ANSWER

Role-based

QUESTION 511

An organization has implemented an enterprise resource planning (ERP) system used by 500 employees from various departments. Which of the following access control approaches is MOST appropriate?

ANSWER

the contract should mandate that the service provider will comply with security policies.

QUESTION 512

An organization plans to contract with an outside service provider to host its corporate web site. The MOST important concern for the information security manager is to ensure that:

ANSWER

To receive an independent view of security exposures

QUESTION 513

Which of the following is the MAIN objective in contracting with an external company to perform penetration testing?

ANSWER

Prepare an impact assessment report.

QUESTION 514

A new port needs to be opened in a perimeter firewall. Which of the following should be the FIRST step before initiating any changes?

ANSWER

Perform an internal risk assessment to determine needed controls.

QUESTION 515

An organization plans to outsource its customer relationship management (CRM) to a third-party service provider. Which of the following should the organization do FIRST?

ANSWER

Continually reinforcing the security policy

QUESTION 516

Which of the following would raise security awareness among an organization's employees?

ANSWER

Review general security settings on each platform

QUESTION 517

Which of the following is the MOST appropriate method of ensuring password strength in a large organization?

ANSWER

External vulnerability reporting sources

QUESTION 518

What is the MOST cost-effective method of identifying new vendor vulnerabilities?

ANSWER

Define and monitor security metrics.

QUESTION 519

Which of the following is the BEST approach for improving information security management processes?

ANSWER

validate and sanitize client side inputs.

QUESTION 520

An effective way of protecting applications against Structured Query Language (SQL) injection vulnerability is to:

ANSWER

has implemented cookies as the sole authentication mechanism.

QUESTION 521

The root cause of a successful cross site request forgery (XSRF) attack against an application is that the vulnerable application:

ANSWER

regulatory and legal requirements.

QUESTION 522

Of the following, retention of business records should be PRIMARILY based on:

ANSWER

Ensuring that the third party is contractually obligated to all relevant security requirements

QUESTION 523

An organization is entering into an agreement with a new business partner to conduct customer mailings. What is the MOST important action that the information security manager needs to perform?

ANSWER

Right to audit

QUESTION 524

An organization that outsourced its payroll processing performed an independent assessment of the security controls of the third party, per policy requirements. Which of the following is the MOST useful requirement to include in the contract?

ANSWER

Conduct regular security reviews of the third-party provider

QUESTION 525

Which of the following is the MOST critical activity to ensure the ongoing security of outsourced IT services?

ANSWER

Set role-based access permissions on the shared folder

QUESTION 526

An organization's operations staff places payment files in a shared network folder and then the disbursement staff picks up the files for payment processing. This manual intervention will be automated some months later, thus cost-efficient controls are sought to protect against file alterations. Which of the following would be the BEST solution?

ANSWER

A change control process

QUESTION 527

Which of the following BEST ensures that security risks will be reevaluated when modifications in application developments are made?

ANSWER

Penetration tests

QUESTION 528

Which is the BEST way to measure and prioritize aggregate risk deriving from a chain of linked system vulnerabilities?

ANSWER

System design specifications

QUESTION 529

In which of the following system development life cycle (SDLC) phases are access control and encryption algorithms chosen?

ANSWER

Security awareness training

QUESTION 530

Which of the following is generally considered a fundamental component of an information security program?

ANSWER

Key metrics indicate a reduction in incident impacts.

QUESTION 531

How would an organization know if its new information security program is accomplishing its goals?

ANSWER

less time is spent on reconnaissance and information gathering.

QUESTION 532

A benefit of using a full disclosure (white box) approach as compared to a blind (black box) approach to penetration testing is that:

ANSWER

User awareness training

QUESTION 533

Which of the following is the BEST method to reduce the number of incidents of employees forwarding spam and chain e-mail messages?

ANSWER

Implementation of lock-out policies

QUESTION 534

Which of the following is the BEST approach to mitigate online brute-force attacks on user accounts?

ANSWER

Signed acceptable use policy

QUESTION 535

Which of the following measures is the MOST effective deterrent against disgruntled stall abusing their privileges?

ANSWER

the existence of messages is unknown.

QUESTION 536

The advantage of sending messages using steganographic techniques, as opposed to utilizing encryption, is that:

ANSWER

formally managed within the information security framework.

QUESTION 537

As an organization grows, exceptions to information security policies that were not originally specified may become necessary at a later date. In order to ensure effective management of business risks, exceptions to such policies should be:

ANSWER

Source code review

QUESTION 538

There is reason to believe that a recently modified web application has allowed unauthorized access. Which is the BEST way to identify an application backdoor?

ANSWER

Clear text authentication

QUESTION 539

Simple Network Management Protocol v2 (SNMP v2) is used frequently to monitor networks. Which of the following vulnerabilities does il always introduce?

ANSWER

Feasibility

QUESTION 540

Which of the following is the FIRST phase in which security should be addressed in the development cycle of a project?

ANSWER

Incremental daily cost of the unavailability of systems

QUESTION 541

Which of the following should be determined FIRST when establishing a business continuity program?

ANSWER

disconnecting the computer from all power sources.

QUESTION 542

A desktop computer that was involved in a computer security incident should be secured as evidence by:

ANSWER

The provider services all major companies in the area

QUESTION 543

A company has a network of branch offices with local file/print and mail servers; each branch individually contracts a hot site. Which of the following would be the GRF.ATEST weakness in recovery capability?

ANSWER

Isolate the affected network segment

QUESTION 544

Which of the following actions should be taken when an online trading company discovers a network attack in progress?

ANSWER

decoy files.

QUESTION 545

The BEST method for detecting and monitoring a hacker's activities without exposing information assets to unnecessary risk is to utilize:

ANSWER

containment.

QUESTION 546

The FIRST priority when responding to a major security incident is:

ANSWER

Backup media is stored offsite

QUESTION 547

Which of the following is the MOST important to ensure a successful recovery?

ANSWER

Business management actively participates

QUESTION 548

Which of the following is the MOST important element to ensure the success of a disaster recovery test at a vendor-provided hot site?

ANSWER

Erase data and software from devices

QUESTION 549

At the conclusion of a disaster recovery test, which of the following should ALWAYS be performed prior to leaving the vendor's hot site facility?

ANSWER

escalation criteria.

QUESTION 550

An incident response policy must contain:

ANSWER

allow business processes to continue during the response.

QUESTION 551

The BEST approach in managing a security incident involving a successful penetration should be to:

ANSWER

lessons learned.

QUESTION 552

A post-incident review should be conducted by an incident management team to determine:

ANSWER

current processing capacity loads at data centers.

QUESTION 553

An organization with multiple data centers has designated one of its own facilities as the recovery site. The MOST important concern is the:

ANSWER

Critical business processes are duplicated

QUESTION 554

Which of the following is MOST important in determining whether a disaster recovery test is successful?

ANSWER

Infrastructure complexity and system sensitivity

QUESTION 555

Which of the following is MOST important when deciding whether to build an alternate facility or subscribe to a third-party hot site?

ANSWER

Block all e-mails containing picture file attachments

QUESTION 556

A new e-mail virus that uses an attachment disguised as a picture file is spreading rapidly over the Internet. Which of the following should be performed FIRST in response to this threat?

ANSWER

Monitor the probe and isolate the affected segment

QUESTION 557

When a large organization discovers that it is the subject of a network probe, which of the following actions should be taken?

ANSWER

All equipment is provided "at time of disaster, not on floor"

QUESTION 558

Which of the following terms and conditions represent a significant deficiency if included in a commercial hot site contract?

ANSWER

Conduct an assessment to determine system status

QUESTION 559

Which of the following should be performed FIRST in the aftermath of a denial-of-service attack?

ANSWER

Detailed technical recovery plans are maintained offsite

QUESTION 560

Which of the following is the MOST important element to ensure the successful recovery of a business during a disaster?

ANSWER

Recovery criteria

QUESTION 561

The business continuity policy should contain which of the following?

ANSWER

potential attacks on the internal network.

QUESTION 562

The PRIMARY purpose of installing an intrusion detection system (IDS) is to identify:

ANSWER

Ensuring accessibility should a disaster occur

QUESTION 563

When an organization is using an automated tool to manage and house its business continuity plans, which of the following is the PRIMARY concern?

ANSWER

Check a sample of servers that the signature files are current

QUESTION 564

Which of the following is the BEST way to verify that all critical production servers are utilizing up to.date virus signature files?

ANSWER

Check IDS logs and monitor for any active attacks

QUESTION 565

Which of the following actions should be taken when an information security manager discovers that a hacker is foot printing the network perimeter?

ANSWER

Ease of maintenance and frequency of updates

QUESTION 566

Which of the following are the MOST important criteria when selecting virus protection software?

ANSWER

Systems are vulnerable to new viruses during the intervening week

QUESTION 567

Which of the following is the MOST serious exposure of automatically updating virus signature files on every desktop each Friday at 11:00 p.m. (23.00 hrs.)?

ANSWER

Business process owners

QUESTION 568

When performing a business impact analysis (BIA), which of the following should calculate the recovery time and cost estimates?

ANSWER

Developing recovery time objectives (RTOs) for critical functions

QUESTION 569

Which of the following is MOST closely associated with a business continuity program?

ANSWER

E-commerce web site

QUESTION 570

Which of the following application systems should have the shortest recovery time objective (RTO)?

ANSWER

Severity criteria

QUESTION 571

A computer incident response team (CIRT) manual should PRIMARILY contain which of the following documents?

ANSWER

weaknesses in network and server security.

QUESTION 572

The PRIMARY purpose of performing an internal attack and penetration test as part of an incident response program is to identify:

ANSWER

kept in the tape library' pending further analysis.

QUESTION 573

Which of the following would represent a violation of the chain of custody when a backup tape has been identified as evidence in a fraud investigation? The tape was:

ANSWER

Incident response plan

QUESTION 574

When properly tested, which of the following would MOST effectively support an information security manager in handling a security breach?

ANSWER

Make a copy of the whole system's memory

QUESTION 575

Isolation and containment measures lor a compromised computer have been taken and information security management is now investigating. What is the MOST appropriate next step?

ANSWER

Hidden data may be stored there

QUESTION 576

Why is "slack space" of value to an information security manager as pan of an incident investigation?

ANSWER

Improve the response process

QUESTION 577

What is the PRIMARY objective of a post-event review in incident response?

ANSWER

strategies validated by senior management.

QUESTION 578

Detailed business continuity plans should be based PRIMARILY on:

ANSWER

rebuild the server with original media and relevant patches.

QUESTION 579

A web server in a financial institution that has been compromised using a super-user account has been isolated, and proper forensic processes have been followed. The next step should be to:

ANSWER

A bit-level copy of all hard drive data

QUESTION 580

Evidence from a compromised server has to be acquired for a forensic investigation. What would be the BEST source?

ANSWER

local regulations.

QUESTION 581

In the course of responding 10 an information security incident, the BEST way to treat evidence for possible legal action is defined by:

ANSWER

reducing the extent of operational damage.

QUESTION 582

Emergency actions are taken at the early stage of a disaster with the purpose of preventing injuries or loss of life and:

ANSWER

Ensure compliance with reporting procedures

QUESTION 583

What is the FIRST action an information security manager should take when a company laptop is reported stolen?

ANSWER

Confirm the incident

QUESTION 584

Which of the following actions should lake place immediately after a security breach is reported to an information security manager?

ANSWER

recovery window.

QUESTION 585

When designing the technical solution for a disaster recovery site, the PRIMARY factor that should be taken into consideration is the:

ANSWER

recovery point objective (RPO).

QUESTION 586

In designing a backup strategy that will be consistent with a disaster recovery strategy, the PRIMARY factor to be taken into account will be the:

ANSWER

run continuously

QUESTION 587

An intrusion detection system (IDS) should:

ANSWER

isolate the infected server(s) from the network.

QUESTION 588

The PRIORITY action to be taken when a server is infected with a virus is to:

ANSWER

The recovery time objective (RTO) was not exceeded during testing

QUESTION 589

Which of the following provides the BKST confirmation that the business continuity/disaster recovery plan objectives have been achieved?

ANSWER

A Trojan was found to be installed on a system administrator's laptop

QUESTION 590

Which of the following situations would be the MOST concern to a security manager?

ANSWER

confirm the incident.

QUESTION 591

A customer credit card database has been breached by hackers. The FIRST step in dealing with this attack should be to:

ANSWER

take an image copy of the media.

QUESTION 592

A root kit was used to capture detailed accounts receivable information. To ensure admissibility of evidence from a legal standpoint, once the incident was identified and the server isolated, the next step should be to:

ANSWER

ensure the assignment of qualified personnel.

QUESTION 593

When collecting evidence for forensic analysis, it is important to:

ANSWER

Employ packet filtering to drop suspect packets

QUESTION 594

What is the BEST method for mitigating against network denial of service (DoS) attacks?

ANSWER

Possible business benefits from incident impact reduction

QUESTION 595

To justify the establishment of an incident management team, an information security manager would find which of the following to be the MOST effective?

ANSWER

Invalid logon attempts

QUESTION 596

A database was compromised by guessing the password for a shared administrative account and confidential customer information was stolen. The information security manager was able to detect this breach by analyzing which of the following?

ANSWER

Diverting incoming traffic upon responding to the denial of service (DoS) attack

QUESTION 597

Which of the following is an example of a corrective control?

ANSWER

Time server

QUESTION 598

To determine how a security breach occurred on the corporate network, a security manager looks at the logs of various devices. Which of the following BEST facilitates the correlation and review of these logs?

ANSWER

install an intrusion detection system (IDS).

QUESTION 599

An organization has been experiencing a number of network-based security attacks that all appear to originate internally. The BEST course of action is to:

ANSWER

Obtain guidance from the firewall manufacturer

QUESTION 600

A serious vulnerability is reported in the firewall software used by an organization. Which of the following should be the immediate action of the information security manager?

ANSWER

retrieve the tapes from the warm site and test them.

QUESTION 601

An organization keeps backup tapes of its servers at a warm site. To ensure that the tapes are properly maintained and usable during a system crash, the MOST appropriate measure the organization should perform is to:

ANSWER

Business impact analysis (BIA)

QUESTION 602

Which of the following processes is critical for deciding prioritization of actions in a business continuity plan?

ANSWER

Copies of the business continuity plan

QUESTION 603

In addition to backup data, which of the following is the MOST important to store offsite in the event of a disaster?

ANSWER

assess the likelihood of incidents from the reported cause.

QUESTION 604

An organization has learned of a security breach at another company that utilizes similar technology. The FIRST thing the information security manager should do is:

ANSWER

Communicating specially drafted messages by an authorized person

QUESTION 605

Which of the following is the MOST important consideration for an organization interacting with the media during a disaster?

ANSWER

report this situation to the data owner.

QUESTION 606

During the security review of organizational servers it was found that a file server containing confidential human resources (HR) data was accessible to all user IDs. As a FIRST step, the security manager should:

ANSWER

preserving the integrity of the evidence.

QUESTION 607

If an organization considers taking legal action on a security incident, the information security manager should focus PRIMARILY on:

ANSWER

Safety of personnel

QUESTION 608

Which of the following has the highest priority when defining an emergency response plan?

ANSWER

enable independent and objective review of the root cause of the incidents.

QUESTION 609

The PRIMARY purpose of involving third-party teams for carrying out post event reviews of information security incidents is to:

ANSWER

capture lessons learned to improve the process.

QUESTION 610

The MOST important objective of a post incident review is to:

ANSWER

Post incident review

QUESTION 611

Which of the following is the BEST mechanism to determine the effectiveness of the incident response process?

ANSWER

validate the incident.

QUESTION 612

The FIRST step in an incident response plan is to:

ANSWER

Determine the extent of the compromise.

QUESTION 613

An organization has verified that its customer information was recently exposed. Which of the following is the FIRST step a security manager should take in this situation?

ANSWER

Validate the incident

QUESTION 614

A possible breach of an organization's IT system is reported by the project manager. What is the FIRST thing the incident response manager should do?

ANSWER

business requirements.

QUESTION 615

The PRIMARY consideration when defining recovery time objectives (RTOs) for information assets is:

ANSWER

Contain the incident.

QUESTION 616

What task should be performed once a security incident has been verified?

ANSWER

Initiate the incident response process.

QUESTION 617

An information security manager believes that a network file server was compromised by a hacker. Which of the following should be the FIRST action taken?

ANSWER

Isolate the server from the network.

QUESTION 618

An unauthorized user gained access to a merchant's database server and customer credit card information. Which of the following would be the FIRST step to preserve and protect unauthorized intrusion activities?

ANSWER

Aligning with recovery time objectives (RTOs)

QUESTION 619

Which of the following would be a MAJOR consideration for an organization defining its business continuity plan (BCP) or disaster recovery program (DRP)?

ANSWER

Proven forensic processes

QUESTION 620

Which of the following would be MOST appropriate for collecting and preserving evidence?

ANSWER

Chain of custody

QUESTION 621

Of the following, which is the MOST important aspect of forensic investigations?

ANSWER

Perform a bit-by-bit image of the original media source onto new media.

QUESTION 622

In the course of examining a computer system for forensic evidence, data on the suspect media were inadvertently altered. Which of the following should have been the FIRST course of action in the investigative process?

ANSWER

Reciprocal arrangement

QUESTION 623

Which of the following recovery strategies has the GREATEST chance of failure?

ANSWER

Maximum tolerable period of data loss

QUESTION 624

Recovery point objectives (RPOs) can be used to determine which of the following?

ANSWER

Preparedness tests

QUESTION 625

Which of the following disaster recovery testing techniques is the MOST cost-effective way to determine the effectiveness of the plan?

ANSWER

Locating the data and preserving the integrity of the data

QUESTION 626

When electronically stored information is requested during a fraud investigation, which of the following should be the FIRST priority?

ANSWER

Establish a chain of custody log.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials