11.1.5 Practice Questions Flashcards

1
Q

Question 1.
A nationwide company realizes its current standardized approach to security is not working. The different company business units need more autonomy and the ability to make decisions that meet their local needs and priorities.
What type of security governance should they follow?

answer
Governance committees
Data protection authorities
Decentralized security governance
Centralized security governance

A

Correct Answer:
Decentralized security governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question 2.
A multinational company discovered its existing cybersecurity policies were no longer adequate due to evolving cybersecurity threats and updated industry regulations.
The board of directors, comprising high-ranking executives, decided to review and revise the policies.
Who should the company involve in this process?

answer
Data processor
Governance committee
Regulatory agency
Data custodian

A

Correct Answer:
Governance committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question 3.
Your organization is implementing a new data governance model. You are tasked with assigning roles to various team members.
One of your colleagues is responsible for processing personal data on behalf of the controller, based on the controller’s instructions.
Which data governance role BEST fits this colleague’s responsibilities?

answer
Processor
Incorrect answer:
Controller
Owner
Custodian

A

Correct Answer:
Processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question 4.
A newly hired chief information security officer (CISO) is implementing the National Institute of Standards and Technology (NIST) Cybersecurity Framework.
What first function would help the CISO better develop the company’s security policies, such as acceptable use policy (AUP), and build out recommendations for security controls?

answer
Protect
Identify
Detect
Respond

A

Correct Answer:
Identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question 5.
A large technology company has recently experienced a significant system failure due to a cyberattack. The chief information security officer (CISO) is conducting a post-incident review to identify ways to improve the organization’s resilience and recovery capabilities.
The CISO wants to focus on strategies that could have prevented the system downtime or minimized its duration and impact.
From a resilience and recovery standpoint in security architecture and continuity of operations planning (COOP), which of the following strategies would the CISO MOST likely recommend implementing to enhance the organization’s ability to prevent or quickly recover from similar incidents in the future? (Select two.)

answer
-Implement a detailed incident response plan
-Establish a redundant data center
-Invest in a stronger firewall system
-Expand the IT team with more developers
-Establish strong password policies and standards

A

Correct Answer:
Implement a detailed incident response plan

Correct Answer:
Establish a redundant data center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question 6.
A nonprofit organization is working to create an integrated strategy that responds to potential disasters and ensures the continuation of essential functions across various scenarios, including budget constraints and prolonged disruptions.
Which approach would BEST address these multifaceted requirements?

answer
Deploy a cold site.
Establish a COOP.
Implement a hot site.
Set up a warm site.

A

Correct Answer:
Establish a COOP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question 7.
A company merged with another company and is reviewing and combining both companies’ procedures for incident response.
What should the joined companies have at the end of this preparation phase?

answer
Incident response plan
Communication plan
Incident response lifecycle
Incorrect answer:
Playbook

A

Correct Answer:
Incident response plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question 8.
A large multinational company adopts a new standard to enhance its information security management system. The company operates across different regions, so the chosen standard must be internationally recognized.
The company wants the standard to provide a comprehensive framework to ensure adequate and proportionate security controls.
Which of the following standards would be MOST suitable for the company’s needs?

answer
ISO/IEC 27001
ISO/IEC 27018
PCI DSS
NIST Special Publication 800-63

A

Correct Answer:
ISO/IEC 27001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question 9.
As a security analyst at a large, you are tasked with reviewing and improving the company’s password security measures.
Currently, the company uses a simple hashing algorithm to store passwords. You are considering four options to enhance password security.
Which of the following would be the MOST effective method to implement?

answer
Implement password complexity requirements
Implement password salting
Increase the minimum password length requirement
Implement a password expiration policy

A

Correct Answer:
Implement password salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question 10.
As a security manager at a financial institution, you are reviewing the company’s access control measures. You have identified potential areas of improvement and are considering four options to enhance access control security.
Which of the following would be the MOST effective method to implement?

answer
Increase password complexity requirements
Implement a two-factor authentication
Implement biometric authentication
Improve session management

A

Correct Answer:
Improve session management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly