Q&A Flashcards
Which of the following is not included within an information security policy?
A. Authority for the information security department.
B. Guidelines on how to implement policy.
C. Basis for data classification.
D. Recognition of information as an asset of the organization
Correct Answer: B
When it comes to Loss Prevention Program, which of the following is a realistic goal?
A. Be 100% effective in preventing losses.
B. Permit losses that aren’t very important.
C. Reduce losses to a pre-defined level that management can tolerate.
D. Reduce losses to within 10% of a pre-defined level.
Correct Answer: C
When it comes to not taking action on an identified risk, what would be the justification?
A. When responsibility for the conditions that cause the risk to arise is outside their department.
B. When the cost of taking action outweighs the potential cost of the risk being realized.
C. When risk reduction measures may affect the productivity of the business.
D. Never — action should always be taken to reduce or eliminate an identified risk.
Correct Answer: B
When it comes to specific risk reduction controls being implemented, which technique would be indicated? A. Threat and vulnerability analysis. B. Risk evaluation. C. ALE calculation. D. Countermeasure cost/benefit analysis.
Correct Answer: D
What is the practice of limiting access to the minimal level that will allow normal functioning called? A. Job rotation B. Least privilege C. Special privilege D. Separation of duties
Correct Answer: B
A benefit of a security awareness program is to change
A. Employee attitudes and behaviors.
B. Management’s approach.
C. Attitudes of management with sensitive data.
D. Corporate attitudes about safeguarding data.
Correct Answer: A
Which services help organizations protect and enhance value by managing risks and opportunities, addressing compliance and supporting management and board oversight, including internal audit. A. Governance oversight B. System security oversight C. Human Resource oversight D. Business service oversight
Correct Answer: A
Least privilege is a core security principle, but it's one that is often met with resistance by users. It involves which of the following? A. individual accountability. B. access authentication. C. authorization levels. D. identification of users
Correct Answer: C
When it comes to a penetration test, which is the first step to consider?
A. The approval of the change control management
B. The development of a detailed test plan
C. The formulation of specific management objectives
D. The communication process among team members
Correct Answer: C
When considering the principle of negligence, executives can be held liable for losses that result from computer system breaches if
A. the company is not a multi-national company.
B. they have not exercised due care protecting computing resources.
C. they have failed to properly insure computer resources against loss.
D. the company does not prosecute the hacker that caused the breach.
Correct Answer: B
In order to be in compliance with certain current privacy laws and principles, what must a company do if it has no written policy notifying its employees that they are monitoring network activity?
A. Monitor only during off hours.
B. Obtain a search warrant prior to monitoring.
C. Not capture any network traffic related to monitoring employee’s activity
D. Apply for a waiver from Interpol before monitoring.
Correct Answer: C
What is the obligation of individuals regarding personal information disclosure related to? A. Privacy B. Secrecy C. Availability D. Reliability
Correct Answer: A
Under which one of the following situations would a Class A fire classification be considered a disaster?
A. The fire caused critical business systems to be disabled for longer than the Recovery Time Objective.
B. The fire alarms went off and the building had to be evacuated
C. The trash can contained company sensitive documents
D. The fire spread beyond the trash can and the fire department had to be called.
Correct Answer: A
Which of the following will most likely not be used to quantify the impact associated with a potential disaster to a commercial enterprise?
A. Identifying the organization’s key business functions.
B. Identifying computer systems critical to the survival of the organization.
C. Estimating the financial impact a loss would have on the business based on how long an outage would last.
D. Acquiring information from government agencies about the likelihood of a natural disaster occurring.
Correct Answer: D
Which of the following is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency? A. Risk assessment B. Emergency response plan C. Disaster recovery plan D. Business impact analysis
Correct Answer: D