Topic 1 Flashcards

1
Q

An information security risk analysis BEST assists an organization in ensuring that:

A. the infrastructure has the appropriate level of access control.
B. cost-effective decisions are made with regard to which assets need protection
C. an appropriate level of funding is applied to security processes.
D. the organization implements appropriate security technologies

A

B. cost-effective decisions are made with regard to which assets need protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In a multinational organization, local security regulations should be implemented over global security policy because:

A. business objectives are defined by local business unit managers.
B. deploying awareness of local regulations is more practical than of global policy.
C. global security policies include unnecessary controls for local businesses.
D. requirements of local regulations take precedence.

A

D. requirements of local regulations take precedence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To gain a clear understanding of the impact that a new regulatory requirement will have on an organization’s information security controls, an information security manager should FIRST:

A. conduct a cost-benefit analysis.
B. conduct a risk assessment.
C. interview senior management.
D. perform a gap analysis.

A

B. conduct a risk assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When management changes the enterprise business strategy, which of the following processes should be used to evaluate the existing
information security controls as well as to select new information security controls?

A. Access control management
B. Change management
C. Configuration management
D. Risk management

A

D. Risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is the BEST way to build a risk-aware culture?

A. Periodically change risk awareness messages.
B. Ensure that threats are communicated organization-wide in a timely manner.
C. Periodically test compliance with security controls and post results.
D. Establish incentives and a channel for staff to report risks.

A

D. Establish incentives and a channel for staff to report risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What would be an information security manager’s BEST recommendation upon learning that an existing contract with a third party does not clearly
identify requirements for safeguarding the organization’s critical data?

A. Cancel the outsourcing contract.
B. Transfer the risk to the provider.
C. Create an addendum to the existing contract.
D. Initiate an external audit of the provider’s data center.

A

C. Create an addendum to the existing contract.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An organization has purchased a security information and event management (SIEM) tool. Which of the following is MOST important to consider before implementation?

A. Controls to be monitored
B. Reporting capabilities
C. The contract with the SIEM vendor
D. Available technical support

A

A. Controls to be monitored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is MOST likely to be included in an enterprise security policy?

A. Definitions of responsibilities
B. Retention schedules
C. System access specifications
D. Organizational risk

A

A. Definitions of responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following should an information security manager do FIRST when a legacy application is not compliant with a regulatory requirement, but the business unit does not have the budget for remediation?

A. Develop a business case for funding remediation efforts.
B. Advise senior management to accept the risk of noncompliance.
C. Notify legal and internal audit of the noncompliant legacy application.
D. Assess the consequences of noncompliance against the cost of remediation.

A

D. Assess the consequences of noncompliance against the cost of remediation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the MOST effective way to address an organization’s security concerns during contract negotiations with a third party?

A. Review the third-party contract with the organization’s legal department.
B. Communicate security policy with the third-party vendor.
C. Ensure security is involved in the procurement process.
D. Conduct an information security audit on the third-party vendor.

A

C. Ensure security is involved in the procurement process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the BEST method to protect consumer private information for an online public website?

A. Apply strong authentication to online accounts
B. Encrypt consumer data in transit and at rest
C. Use secure encrypted transport layer
D. Apply a masking policy to the consumer data

A

B. Encrypt consumer data in transit and at rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is the MOST important consideration in a bring your own device (BYOD) program to protect company data in the event of a loss?

A. The ability to remotely locate devices
B. The ability to centrally manage devices
C. The ability to restrict unapproved applications
D. The ability to classify types of devices

A

B. The ability to centrally manage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An information security manager has been asked to determine whether an information security initiative has reduced risk to an acceptable level.
Which of the following activities would provide the BEST information for the information security manager to draw a conclusion?

A. Initiating a cost-benefit analysis of the implemented controls
B. Performing a risk assessment
C. Reviewing the risk register
D. Conducting a business impact analysis (BIA)

A

B. Performing a risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An organization that uses external cloud services extensively is concerned with risk monitoring and timely response. The BEST way to address this concern is to ensure:

A. the availability of continuous technical support.
B. appropriate service level agreements (SLAs) are in place.
C. a right-to-audit clause is included in contracts.
D. internal security standards are in place.

A

B. appropriate service level agreements (SLAs) are in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the BEST way to ensure that organizational security policies comply with data security regulatory requirements?

A. Obtain annual sign-off from executive management.
B. Align the policies to the most stringent global regulations.
C. Send the policies to stakeholders for review.
D. Outsource compliance activities.

A

B. Align the policies to the most stringent global regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The PRIMARY reason for defining the information security roles and responsibilities of staff throughout an organization is to:

A. comply with security policy.
B. increase corporate accountability.
C. enforce individual accountability.
D. reinforce the need for training.

A

C. enforce individual accountability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Threat and vulnerability assessments are important PRIMARILY because they are:

A. used to establish security investments.
B. needed to estimate risk.
C. the basis for setting control objectives.
D. elements of the organization’s security posture.

A

B. needed to estimate risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following should be an information security managers PRIMARY focus during the development of a critical system storing highly confidential data?

A. Ensuring the amount of residual risk is acceptable
B. Reducing the number of vulnerabilities detected
C. Avoiding identified system threats
D. Complying with regulatory requirements

A

A. Ensuring the amount of residual risk is acceptable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When evaluating vendors for sensitive data processing, which of the following should be the FIRST step to ensure the correct level of information security is provided?

A. Develop metrics for vendor performance.
B. Include information security criteria as part of vendor selection.
C. Review third-party reports of potential vendors.
D. Include information security clauses in the vendor contract.

A

B. Include information security criteria as part of vendor selection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An information security team is investigating an alleged breach of an organization’s network. Which of the following would be the BEST single source of evidence to review?

A. File integrity monitoring (FIM) software
B. Security information and event management (SIEM) tool
C. Intrusion detection system (IDS)
D. Antivirus software

A

B. Security information and event management (SIEM) tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Over the last year, an information security manager has performed risk assessments on multiple third-party vendors. Which of the following criteria would be
MOST helpful in determining the associated level of risk applied to each vendor?

A. Compliance requirements associated with the regulation
B. Criticality of the service to the organization
C. Corresponding breaches associated with each vendor
D. Compensating controls in place to protect information security

A

B. Criticality of the service to the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?

A. Security audit reports
B. Recovery time objective (RTO)
C. Technological capabilities
D. Escalation processes

A

D. Escalation processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Executive leadership has decided to engage a consulting firm to develop and implement a comprehensive security framework for the organization to allow senior management to remain focused on business priorities. Which of the following poses the GREATEST challenge to the successful
implementation of the new security governance framework?

A. Executive leadership becomes involved in decisions about information security governance.
B. Executive leadership views information security governance primarily as a concern of the information security management team
C. Information security staff has little or no experience with the practice of information security governance.
D. Information security management does not fully accept the responsibility for information security governance.

A

B. Executive leadership views information security governance primarily as a concern of the information security management team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Risk scenarios simplify the risk assessment process by:

A. covering the full range of possible risk.
B. ensuring business risk is mitigated.
C. reducing the need for subsequent risk evaluation.
D. focusing on important and relevant risk.

A

D. focusing on important and relevant risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following is the MOST important consideration when developing information security objectives?

A. They are regularly reassessed and reported to stakeholders
B. They are approved by the IT governance function
C. They are clear and can be understood by stakeholders
D. They are identified using global security frameworks and standards

A

C. They are clear and can be understood by stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A legacy application does not comply with new regulatory requirements to encrypt sensitive data at rest, and remediating this issue would require significant investment. What should the information security manager do FIRST?

A. Assess the business impact to the organization.
B. Present the noncompliance risk to senior management.
C. Investigate alternative options to remediate the noncompliance.
D. Determine the cost to remediate the noncompliance.

A

A. Assess the business impact to the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following BEST enables effective information security governance?

A. Security-aware corporate culture
B. Advanced security technologies
C. Periodic vulnerability assessments
D. Established information security metrics

A

A. Security-aware corporate culture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Application data integrity risk is MOST directly addressed by a design that includes.

A. strict application of an authorized data dictionary.
B. reconciliation routines such as checksums, hash totals, and record counts.
C. application log requirements such as field-level audit trails and user activity logs.
D. access control technologies such as role-based entitlements.

A

B. reconciliation routines such as checksums, hash totals, and record counts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Deciding the level of protection a particular asset should be given is BEST determined by:

A. the corporate risk appetite.
B. a risk analysis.
C. a threat assessment.
D. a vulnerability assessment.

A

B. a risk analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What should be an information security manager’s FIRST step when developing a business case for a new intrusion detection system (IDS) solution?

A. Calculate the total cost of ownership (TCO).
B. Define the issues to be addressed.
C. Perform a cost-benefit analysis.
D. Conduct a feasibility study.

A

B. Define the issues to be addressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is the MOST important incident management consideration for an organization subscribing to a cloud service?

A. Decision on the classification of cloud-hosted data
B. Expertise of personnel providing incident response
C. Implementation of a SIEM in the organization
D. An agreement on the definition of a security incident

A

D. An agreement on the definition of a security incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is the BEST way for an organization to determine the maturity level of its information security program?

A. Review the results of information security awareness testing.
B. Validate the effectiveness of implemented security controls.
C. Benchmark the information security policy against industry standards.
D. Track the trending of information security incidents.

A

C. Benchmark the information security policy against industry standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization’s critical systems?

A. Increase the frequency of log monitoring and analysis.
B. Implement a security information and event management system (SIEM).
C. Increase the sensitivity of intrusion detection systems.
D. Implement multi-factor authentication.

A

D. Implement multi-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

When supporting an organization’s privacy officer which of the following is the information security manager’s PRIMARY role regarding privacy requirements?

A. Ensuring appropriate controls are in place
B. Monitoring the transfer of private data
C. Determining data classification
D. Conducting privacy awareness programs

A

A. Ensuring appropriate controls are in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The chief information security officer (CISO) has developed an information security strategy, but is struggling to obtain senior management commitment for funds to implement the strategy. Which of the following is the MOST likely reason?

A. The strategy does not include a cost-benefit analysis.
B. There was a lack of engagement with the business during development.
C. The strategy does not comply with security standards.
D. The CISO reports to the CIO.

A

B. There was a lack of engagement with the business during development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

An organization’s CIO has tasked the information security manager with drafting the charter for an information security steering committee. The committee will be comprised of the CIO, the IT shared services manager, the vice president of marketing, and the information security manager.
Which of the following is the MOST significant issue with the development of this committee?

A. The committee consists of too many senior executives.
B. The committee lacks sufficient business representation.
C. There is a conflict of interest between the business and IT.
D. The CIO is not taking charge of the committee.

A

B. The committee lacks sufficient business representation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the PRIMARY purpose of an unannounced disaster recovery exercise?

A. To provide metrics to senior management
B. To evaluate how personnel react to the situation
C. To assess service level agreements (SLAs)
D. To estimate the recovery time objective (RTO)

A

B. To evaluate how personnel react to the situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Labeling information according to its security classification:

A. reduces the need to identify baseline controls for each classification.
B. reduces the number and type of countermeasures required.
C. enhances the likelihood of people handling information securely.
D. affects the consequences if information is handled insecurely.

A

C. enhances the likelihood of people handling information securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of the following is the MOST effective approach for determining whether an organization’s information security program supports the information security strategy?

A. Ensure resources meet information security program needs
B. Audit the information security program to identify deficiencies
C. Identify gaps impacting information security strategy
D. Develop key performance indicators (KPIs) of information security

A

D. Develop key performance indicators (KPIs) of information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

When drafting the corporate privacy statement for a public web site, which of the following MUST be included?

A. Limited liability clause
B. Access control requirements
C. Explanation of information usage
D. Information encryption requirements

A

C. Explanation of information usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

An organization is concerned with the potential for exploitation of vulnerabilities in its server systems. Which of the following is the BEST control to mitigate the associated risk?

A. Enforcing standard system configurations based on secure configuration benchmarks
B. Implementing network and system-based anomaly monitoring software for server systems
C. Enforcing configurations for secure logging and audit trails on server systems
D. Implementing host-based intrusion detection systems (IDS) on server systems

A

A. Enforcing standard system configurations based on secure configuration benchmarks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which of the following is the MOST important step when establishing guidelines for the use of social networking sites in an organization?

A. Identify secure social networking sites
B. Establish disciplinary actions for noncompliance
C. Perform a vulnerability assessment
D. Define acceptable information for posting

A

D. Define acceptable information for posting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Regular vulnerability scanning on an organization’s internal network has identified that many user workstations have unpatched versions of software. What is the
BEST way for the information security manager to help senior management understand the related risk?

A. Include the impact of the risk as part of regular metrics.
B. Send regular notifications directly to senior managers.
C. Recommend the security steering committee conduct a review.
D. Update the risk assessment at regular intervals.

A

A. Include the impact of the risk as part of regular metrics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which of the following BEST prepares a computer incident response team for a variety of information security scenarios?

A. Tabletop exercises
B. Forensics certification
C. Penetration tests
D. Disaster recovery drills

A

A. Tabletop exercises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which of the following BEST protects against phishing attacks?

A. Security strategy training
B. Email filtering
C. Network encryption
D. Application whitelisting

A

A. Security strategy training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following is the MOST effective method of preventing deliberate internal security breaches?

A. Well-designed intrusion detection system (IDS)
B. Biometric security access control
C. Well-designed firewall system
D. Screening prospective employees

A

D. Screening prospective employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

When designing security controls, it is MOST important to:

A. focus on preventive controls.
B. apply controls to confidential information.
C. evaluate the costs associated with the controls.
D. apply a risk-based approach.

A

D. apply a risk-based approach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

An information security team plans to increase password complexity requirements for a customer-facing site, but there are concerns it will
negatively impact the user experience. Which of the following is the information security manager’s BEST course of action?

A. Evaluate business compensating controls.
B. Quantify the security risk to the business.
C. Assess business impact against security risk.
D. Conduct industry benchmarking.

A

C. Assess business impact against security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?

A. Review and update existing security policies.
B. Enforce passwords and data encryption on the devices.
C. Conduct security awareness training.
D. Require remote wipe capabilities for devices.

A

A. Review and update existing security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which of the following would be MOST useful to help senior management understand the status of information security compliance?

A. Key performance indicators (KPIs)
B. Risk assessment results
C. Industry benchmarks
D. Business impact analysis (BIA) results

A

A. Key performance indicators (KPIs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which of the following is the MOST important reason for an organization to develop an information security governance program?

A. Establishment of accountability
B. Compliance with audit requirements
C. Creation of tactical solutions
D. Monitoring of security incidents

A

A. Establishment of accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which of the following provides the MOST essential input for the development of an information security strategy?

A. Results of an information security gap analysis
B. Measurement of security performance against IT goals
C. Results of a technology risk assessment
D. Availability of capable information security resources

A

A. Results of an information security gap analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

The MOST important reason for an information security manager to be involved in the change management process is to ensure that:

A. security controls drive technology changes.
B. risks have been evaluated.
C. security controls are updated regularly.
D. potential vulnerabilities are identified.

A

B. risks have been evaluated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which of the following should be the PRIMARY focus of a status report on the information security program to senior management?

A. Confirming the organization complies with security policies
B. Verifying security costs do not exceed the budget
C. Demonstrating risk is managed at the desired level
D. Providing evidence that resources are performing as expected

A

C. Demonstrating risk is managed at the desired level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which of the following is MOST likely to be a component of a security incident escalation policy?

A. Names and telephone numbers of key management personnel
B. A severity-ranking mechanism tied only to the duration of the outage
C. Sample scripts and press releases for statements to media
D. Decision criteria for when to alert various groups

A

D. Decision criteria for when to alert various groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which of the following would be an information security manager’s PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?

A. Configuration management
B. Mobile application control
C. Inconsistent device security
D. End user acceptance

A

C. Inconsistent device security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its
cloud services.
Which of the following should be the PRIMARY focus of Company A’s information security manager?

A. The cost to align to Company A’s security policies
B. The organizational structure of Company B
C. Company B’s security policies
D. Company A’s security architecture

A

C. Company B’s security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which of the following should be done FIRST when selecting performance metrics to report on the vendor risk management process?

A. Select the data source.
B. Review the confidentiality requirements.
C. Identify the intended audience.
D. Identify the data owner.

A

C. Identify the intended audience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which of the following BEST determines what information should be shared with different entities during incident response?

A. Escalation procedures
B. Communication plan
C. Disaster recovery policy
D. Business continuity plan (BCP)

A

B. Communication plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which of the following is the BEST way to enhance training for incident response teams?

A. Conduct interviews with organizational units.
B. Establish incident key performance indicators (KPIs).
C. Participate in emergency response activities.
D. Perform post-incident reviews.

A

D. Perform post-incident reviews.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

An information security manager wants to improve the ability to identify changes in risk levels affecting the organization’s systems. Which of the
following is the BEST method to achieve this objective?

A. Performing business impact analyses (BIA)
B. Monitoring key goal indicators (KGIs)
C. Monitoring key risk indicators (KRIs)
D. Updating the risk register

A

C. Monitoring key risk indicators (KRIs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

When developing an escalation process for an incident response plan, the information security manager should PRIMARILY consider the:

A. affected stakeholders.
B. incident response team.
C. availability of technical resources.
D. media coverage

A

A. affected stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which of the following should be an information security managers MOST important consideration when determining if an information asset has been classified appropriately?

A. Value to the business
B. Security policy requirements
C. Ownership of information
D. Level of protection

A

A. Value to the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

The effectiveness of an incident response team will be GREATEST when:

A. the incident response process is updated based on lessons learned.
B. the incident response team members are trained security personnel.
C. the incident response team meets on a regular basis to review log files.
D. incidents are identified using a security information and event monitoring (SIEM) system.

A

A. the incident response process is updated based on lessons learned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

An information security manager MUST have an understanding of the organization’s business goals to:

A. relate information security to change management.
B. develop an information security strategy.
C. develop operational procedures
D. define key performance indicators (KPIs).

A

B. develop an information security strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

An information security manager MUST have an understanding of an information security program?

A. Understanding current and emerging technologies
B. Establishing key performance indicators (KPIs)
C. Conducting periodic risk assessments
D. Obtaining stakeholder input

A

C. Conducting periodic risk assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

An attacker was able to gain access to an organization’s perimeter firewall and made changes to allow wider external access and to steal data.
Which of the following would have BEST provided timely identification of this incident?

A. Implementing a data loss prevention (DLP) suite
B. Deploying an intrusion prevention system (IPS)
C. Deploying a security information and event management system (SIEM)
D. Conducting regular system administrator awareness training

A

C. Deploying a security information and event management system (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

When establishing metrics for an information security program, the BEST approach is to identify indicators that:

A. support major information security initiatives.
B. reflect the corporate risk culture.
C. reduce information security program spending.
D. demonstrate the effectiveness of the security program.

A

D. demonstrate the effectiveness of the security program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

For an organization that provides web-based services, which of the following security events would MOST likely initiate an incident response plan and be escalated to management?

A. Anti-malware alerts on several employees’ workstations
B. Several port scans of the web server
C. Multiple failed login attempts on an employee’s workstation
D. Suspicious network traffic originating from the demilitarized zone (DMZ)

A

D. Suspicious network traffic originating from the demilitarized zone (DMZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

An information security manager is implementing a bring your own device (BYOD) program. Which of the following would BEST ensure that users adhere to the security standards?
A. Publish the standards on the intranet landing page.
B. Deploy a device management solution.
C. Establish an acceptable use policy.
D. Monitor user activities on the network.

A

C. Establish an acceptable use policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

When monitoring the security of a web-based application, which of the following is MOST frequently reviewed?

A. Audit reports
B. Access logs
C. Access lists
D. Threat metrics

A

B. Access logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which of the following is the MOST effective way for an information security manager to ensure that security is incorporated into an organization’s project development processes?

A. Develop good communications with the project management office (PMO).
B. Participate in project initiation, approval, and funding.
C. Conduct security reviews during design, testing, and implementation.
D. Integrate organization’s security requirements into project management.

A

D. Integrate organization’s security requirements into project management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Which of the following provides the MOST relevant information to determine the overall effectiveness of an information security program and underlying business processes?

A. SWOT analysis
B. Industry benchmarks
C. Cost-benefit analysis
D. Balanced scorecard

A

D. Balanced scorecard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

An organization finds unauthorized software has been installed on a number of workstations. The software was found to contain a Trojan, which had been uploading data to an unknown external party. Which of the following would have BEST prevented the installation of the unauthorized software?

A. Banning executable file downloads at the Internet firewall
B. Implementing an intrusion detection system (IDS)
C. Implementing application blacklisting
D. Removing local administrator rights

A

D. Removing local administrator rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

When developing a tabletop test plan for incident response testing, the PRIMARY purpose of the scenario should be to:

A. measure management engagement as part of an incident response team.
B. provide participants with situations to ensure understanding of their roles.
C. give the business a measure of the organization’s overall readiness.
D. challenge the incident response team to solve the problem under pressure.

A

B. provide participants with situations to ensure understanding of their roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Which of the following is MOST important for an information security manager to consider when identifying information security resource requirements?

A. Availability of potential resources
B. Information security incidents
C. Current resourcing levels
D. Information security strategy

A

D. Information security strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Which of the following is the MAIN benefit of performing an assessment of existing incident response processes?

A. Validation of current capabilities
B. Benchmarking against industry peers
C. Prioritization of action plans
D. Identification of threats and vulnerabilities

A

A. Validation of current capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Which of the following BEST describes a buffer overflow?

A. A type of covert channel that captures data
B. A function is carried out with more data than the function can handle
C. Malicious code designed to interfere with normal operations
D. A program contains a hidden and unintended function that presents a security risk

A

B. A function is carried out with more data than the function can handle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Which of the following is the MOST important consideration when selecting members for an information security steering committee?

A. Information security expertise
B. Tenure in the organization
C. Business expertise
D. Cross-functional composition

A

D. Cross-functional composition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Which of the following BEST validates that security controls are implemented in a new business process?

A. Verify the use of a recognized control framework
B. Review the process for conformance with information security best practices
C. Benchmark the process against industry practices
D. Assess the process according to information security policy

A

D. Assess the process according to information security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which of the following is the MOST effective way for an organization to ensure its third-party service providers are aware of information security requirements and expectations?

A. Including information security clauses within contracts
B. Auditing the service delivery of third-party providers
C. Providing information security training to third-party personnel
D. Requiring third parties to sign confidentiality agreements

A

A. Including information security clauses within contracts

82
Q

The MOST important reason to use a centralized mechanism to identify information security incidents is to:

A. comply with corporate policies
B. detect threats across environments
C. prevent unauthorized changes to networks
D. detect potential fraud

A

B. detect threats across environments

83
Q

Which of the following should be done FIRST when establishing security measures for personal data stored and processed on a human resources management system?

A. Conduct a vulnerability assessment.
B. Move the system into a separate network.
C. Conduct a privacy impact assessment (PIA).
D. Evaluate data encryption technologies.

A

C. Conduct a privacy impact assessment (PIA).

84
Q

An information security manager has been informed of a new vulnerability in an online banking application, and a patch to resolve this issue is expected to be released in the next 72 hours. Which of the following should the information security manager do FIRST?

A. Implement mitigating controls.
B. Perform a business impact analysis (BIA).
C. Perform a risk assessment.
D. Notify senior management.

A

C. Perform a risk assessment.

85
Q

Which of the following is MOST relevant for an information security manager to communicate to the board of directors?

A. The level of exposure
B. Vulnerability assessments
C. The level of inherent risk
D. Threat assessments

A

A. The level of exposure

86
Q

Senior management has just accepted the risk of noncompliance with a new regulation. What should the information security manager do NEXT?

A. Report the decision to the compliance officer.
B. Reassess the organization’s risk tolerance.
C. Update details within the risk register.
D. Assess the impact of the regulation.

A

C. Update details within the risk register.

87
Q

Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization’s information security requirements?

A. A live demonstration of the third-party supplier’s security capabilities
B. The ability to audit the third-party supplier’s IT systems and processes
C. Third-party security control self-assessment results
D. An independent review report indicating compliance with industry standards

A

D. An independent review report indicating compliance with industry standards

88
Q

Which of the following is the MOST essential element of an information security program?

A. Prioritizing program deliverables based on available resources
B. Benchmarking the program with global standards for relevance
C. Involving functional managers in program development
D. Applying project management practices used by the business

A

C. Involving functional managers in program development

89
Q

Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?
A. Projected increase in maturity level
B. Estimated increase in efficiency
C. Projected costs over time
D. Estimated reduction in risk

A

D. Estimated reduction in risk

90
Q

If the inherent risk of a business activity is higher than the acceptable risk level, the information security manager should FIRST:

A. transfer risk to a third party to avoid cost of impact.
B. recommend that management avoid the business activity.
C. assess the gap between current and acceptable level of risk.
D. implement controls to mitigate the risk to an acceptable level.

A

C. assess the gap between current and acceptable level of risk.

91
Q

Which of the following BEST enables the deployment of consistent security throughout international branches within a multinational organization?

A. Remediation of audit findings
B. Decentralization of security governance
C. Establishment of security governance
D. Maturity of security processes

A

C. Establishment of security governance

92
Q

What is the PRIMARY benefit of effective configuration management?

A. Standardization of system support
B. Reduced frequency of incidents
C. Decreased risk to the organization’s systems
D. Improved vulnerability management

A

C. Decreased risk to the organization’s systems

93
Q

A large organization is in the process of developing its information security program that involves working with several complex organizational
functions. Which of the following will BEST enable the successful implementation of this program?

A. Security governance
B. Security policy
C. Security metrics
D. Security guidelines

A

A. Security governance

94
Q

What is the BEST reason to keep information security policies separate from procedures?

A. To keep policies from having to be changed too frequently
B. To ensure that individual documents do not contain conflicting information
C. To keep policy documents from becoming too large
D. To ensure policies receive the appropriate approvals

A

A. To keep policies from having to be changed too frequently

95
Q

A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to
an information security manager if omitted from the contract?

A. Escrow of software code with conditions for code release
B. Right of the subscriber to conduct onsite audits of the vendor
C. Authority of the subscriber to approve access to its data
D. Commingling of subscribers’ data on the same physical server

A

C. Authority of the subscriber to approve access to its data

96
Q

An information security manager has identified a major security event with potential noncompliance implications. Who should be notified FIRST?

A. Internal audit
B. Public relations team
C. Senior management
D. Regulatory authorities

A

C. Senior management

97
Q

Which of the following is the PRIMARY purpose of establishing an information security governance framework?

A. To proactively address security objectives
B. To reduce security audit issues
C. To enhance business continuity planning
D. To minimize security risks

A

A. To proactively address security objectives

98
Q

An organization is leveraging tablets to replace desktop computers shared by shift-based staff. These tablets contain critical business data and are inherently at increased risk of theft. Which of the following will BEST help to mitigate this risk?

A. Implement remote wipe capability.
B. Create an acceptable use policy.
C. Conduct a mobile device risk assessment.
D. Deploy mobile device management (MDM).

A

D. Deploy mobile device management (MDM).

99
Q

When scoping a risk assessment, assets need to be classified by:

A. sensitivity and criticality.
B. likelihood and impact.
C. threats and opportunities.
D. redundancy and recoverability.

A

A. sensitivity and criticality.

100
Q

Which of the following would BEST enable effective decision-making?

A. Annualized loss estimates determined from past security events
B. A universally applied list of generic threats, impacts, and vulnerabilities
C. A consistent process to analyze new and historical information risk
D. Formalized acceptance of risk analysis by business management

A

C. A consistent process to analyze new and historical information risk

101
Q

Which of the following has the GREATEST impact on efforts to improve an organization’s security posture?

A. Well-documented security policies and procedures
B. Supportive tone at the top regarding security
C. Regular reporting to senior management
D. Automation of security controls

A

B. Supportive tone at the top regarding security

102
Q

Which of the following is the BEST strategy to implement an effective operational security posture?

A. Increased security awareness
B. Defense in depth
C. Threat management
D. Vulnerability management

A

B. Defense in depth

103
Q

In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?

A. Non-standard event logs
B. Access to the hardware
C. Data encryption
D. Compressed customer data

A

B. Access to the hardware

104
Q

The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning process is to:

A. obtain the support of executive management.
B. document the disaster recovery process.
C. map the business process to supporting IT and other corporate resources.
D. identify critical processes and the degree of reliance on support services.

A

D. identify critical processes and the degree of reliance on support services.

105
Q

Which of the following is MOST important when selecting an information security metric?

A. Ensuring the metric is repeatable
B. Aligning the metric to the IT strategy
C. Defining the metric in qualitative terms
D. Defining the metric in quantitative terms

A

B. Aligning the metric to the IT strategy

106
Q

Which of the following is the BEST way for an information security manager to justify ongoing annual maintenance fees associated with an intrusion prevention system (IPS)?

A. Establish and present appropriate metrics that track performance.
B. Perform industry research annually and document the overall ranking of the IPS.
C. Perform a penetration test to demonstrate the ability to protect.
D. Provide yearly competitive pricing to illustrate the value of the IPS.

A

A. Establish and present appropriate metrics that track performance.

107
Q

An organization wants to enable digital forensics for a business-critical application. Which of the following will BEST help to support this objective?

A. Install biometric access control.
B. Develop an incident response plan.
C. Define data retention criteria.
D. Enable activity logging.

A

D. Enable activity logging.

108
Q

An employee clicked on a link in a phishing email, triggering a ransomware attack. Which of the following should be the information security manager’s FIRST step?

A. Notify internal legal counsel.
B. Isolate the impacted endpoints.
C. Wipe the affected system.
D. Notify senior management.

A

B. Isolate the impacted endpoints.

109
Q

A recent audit found that an organization’s new user accounts are not set up uniformly. Which of the following is MOST important for the information security manager to review?

A. Security policies
B. Automated controls
C. Guidelines
D. Standards

A

D. Standards

110
Q

Which of the following metrics is the BEST measure of the effectiveness of an information security program?

A. Reduction in the amount of risk exposure in an organization
B. Reduction in the number of threats to an organization
C. Reduction in the cost of risk remediation for an organization
D. Reduction in the number of vulnerabilities in an organization

A

A. Reduction in the amount of risk exposure in an organization

111
Q

Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?

A. Update the risk assessment framework.
B. Monitor the effectiveness of controls.
C. Review the risk probability and impact.
D. Review the inherent risk level.

A

B. Monitor the effectiveness of controls.

112
Q

The BEST way to avoid session hijacking is to use:

A. strong password controls.
B. a firewall.
C. a reverse lookup.
D. a secure protocol.

A

D. a secure protocol.

113
Q

A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server. Which of the following would
MOST effectively allow the hospital to avoid paying the ransom?

A. A continual server replication process
B. Employee training on ransomware
C. A properly tested offline backup system
D. A properly configured firewall

A

C. A properly tested offline backup system

114
Q

Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?

A. Help desk
B. Legal
C. Information security
D. Human resources (HR)

A

D. Human resources (HR)

115
Q

The authorization to transfer the handling of an internal security incident to a third-party support provider is PRIMARILY defined by the:

A. escalation procedures.
B. information security manager.
C. chain of custody.
D. disaster recovery plan (DRP).

A

A. escalation procedures.

116
Q

What is the PRIMARY objective of performing a vulnerability assessment following a business system update?

A. Improve the change control process.
B. Update the threat landscape.
C. Determine operational losses.
D. Review the effectiveness of controls.

A

D. Review the effectiveness of controls.

117
Q

Which of the following should an information security manager perform FIRST when an organization’s residual risk has increased?

A. Implement security measures to reduce the risk.
B. Assess the business impact.
C. Transfer the risk to third parties.
D. Communicate the information to senior management.

A

B. Assess the business impact.

118
Q

Which of the following is the PRIMARY reason for an information security manager to present the business case for an information security initiative to senior management?

A. To aid management in the decision-making process for purchasing the solution
B. To represent stakeholders who will benefit from enhancements in information security
C. To provide management with the status of the information security program
D. To demonstrate to management the due diligence involved with selecting the solution

A

A. To aid management in the decision-making process for purchasing the solution

119
Q

During a security assessment, an information security manager finds a number of security patches were not installed on a server hosting a critical business application. The application owner did not approve the patch installation to avoid interrupting the application. Which of the following should be the information security manager’s FIRST course of action?

A. Report the risk to the information security steering committee.
B. Determine mitigation options with IT management.
C. Communicate the potential impact to the application owner.
D. Escalate the risk to senior management.

A

C. Communicate the potential impact to the application owner.

120
Q

Which of the following BEST indicates an effective vulnerability management program?

A. Security incidents are reported in a timely manner.
B. Threats are identified accurately.
C. Controls are managed proactively.
D. Risks are managed within acceptable limits.

A

D. Risks are managed within acceptable limits.

121
Q

An organization has experienced multiple instances of privileged users misusing their access. Which of the following processes would be MOST helpful in identifying such violations?

A. Policy exception review
B. Review of access controls
C. Security assessment
D. Log review

A

D. Log review

122
Q

An information security manager discovers that the organization’s new information security policy is not being followed across all departments.
Which of the following should be of GREATEST concern to the information security manager?

A. Business unit management has not emphasized the importance of the new policy.
B. Different communication methods may be required for each business unit.
C. The wording of the policy is not tailored to the audience.
D. The corresponding controls are viewed as prohibitive to business operations.

A

D. The corresponding controls are viewed as prohibitive to business operations.

123
Q

Which of the following is the BEST defense against a brute force attack?

A. Intruder detection lockout
B. Time-of-day restrictions
C. Discretionary access control
D. Mandatory access control

A

A. Intruder detection lockout

124
Q

Which of the following is the MOST important reason to involve external forensics experts in evidence collection when responding to a major
security breach?

A. To provide the response team with expert training on evidence handling
B. To ensure evidence is handled by qualified resources
C. To prevent evidence from being disclosed to any internal staff members
D. To validate the incident response process

A

B. To ensure evidence is handled by qualified resources

125
Q

Which of the following is the GREATEST benefit of integrating information security program requirements into vendor management?

A. The ability to meet industry compliance requirements
B. The ability to define service level agreements (SLAs)
C. The ability to reduce risk in the supply chain
D. The ability to improve vendor performance

A

C. The ability to reduce risk in the supply chain

126
Q

Who should determine data access requirements for an application hosted at an organization’s data center?

A. Information security manager
B. Business owner
C. Data custodian
D. Systems administrator

A

B. Business owner

127
Q

Which of the following is the MOST important objective of testing a security incident response plan?

A. Ensure the thoroughness of the response plan.
B. Verify the response assumptions are valid.
C. Confirm that systems are recovered in the proper order.
D. Validate the business impact analysis (BIA).

A

B. Verify the response assumptions are valid.

128
Q

Which of the following is the MOST important reason for performing a cost-benefit analysis when implementing a security control?

A. To ensure that the mitigation effort does not exceed the asset value
B. To ensure that benefits are aligned with business strategies
C. To present a realistic information security budget
D. To justify information security program activities

A

A. To ensure that the mitigation effort does not exceed the asset value

129
Q

An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purpose?

A. Policies
B. Standards
C. Procedures
D. Guidelines

A

B. Standards

130
Q

Which of the following information BEST supports risk management decision making?

A. Results of a vulnerability assessment
B. Estimated savings resulting from reduced risk exposure
C. Average cost of risk events
D. Quantification of threats through threat modeling

A

D. Quantification of threats through threat modeling

131
Q

Which of the following is MOST important to do after a security incident has been verified?

A. Notify the appropriate law enforcement authorities of the incident.
B. Follow the escalation process to inform key stakeholders.
C. Prevent the incident from creating further damage to the organization.
D. Contact forensic investigators to determine the root cause.

A

C. Prevent the incident from creating further damage to the organization.

132
Q

Which of the following should be the PRIMARY driver for selecting and implementing appropriate controls to address the risk associated with weak user passwords?

A. The organization’s risk tolerance
B. The organization’s culture
C. The cost of risk mitigation controls
D. Direction from senior management

A

A. The organization’s risk tolerance

133
Q

Which of the following is MOST important to consider when determining the effectiveness of the information security governance program?

A. Key performance indicators (KPIs)
B. Maturity models
C. Risk tolerance levels
D. Key risk indicators (KRIs)

A

A. Key performance indicators (KPIs)

134
Q

The business advantage of implementing authentication tokens is that they:

A. provide nonrepudiation.
B. reduce overall cost.
C. reduce administrative workload.
D. improve access security.

A

D. improve access security.

135
Q

In an organization that has several independent security tools including intrusion detection systems (IDSs) and firewalls, which of the following is the BEST way to ensure timely detection of incidents?

A. Implement a log aggregation and correlation solution.
B. Ensure that the incident response plan is endorsed by senior management.
C. Ensure staff are cross trained to manage all security tools.
D. Outsource the management of security tools to a service provider.

A

A. Implement a log aggregation and correlation solution.

136
Q

Which of the following is the MAIN objective of a risk management program?

A. Reduce corporate liability for information security incidents.
B. Reduce risk to the level of the organization’s risk appetite
C. Reduce risk to the maximum extent possible
D. Reduce costs associated with incident response.

A

B. Reduce risk to the level of the organization’s risk appetite

137
Q

An information security manager was informed that a planned penetration test could potentially disrupt some services. Which of the following should be the FIRST course of action?

A. Estimate the impact and inform the business owner.
B. Accept the risk and document it in the risk register.
C. Ensure the service owner is available during the penetration test.
D. Reschedule the activity during an approved maintenance window.

A

A. Estimate the impact and inform the business owner.

138
Q

The PRIMARY advantage of single sign-on (SSO) is that it will:

A. support multiple authentication mechanisms.
B. strengthen user passwords.
C. increase efficiency of access management.
D. increase the security of related applications.

A

C. increase efficiency of access management.

139
Q

Which of the following is BEST determined by using technical metrics?

A. Whether controls are operating effectively
B. How well security risk is being managed
C. Whether security resources are adequately allocated
D. How well the security strategy is aligned with organizational objectives

A

A. Whether controls are operating effectively

140
Q

The use of a business case to obtain funding for an information security investment is MOST effective when the business case:

A. relates the investment to the organization’s strategic plan.
B. realigns information security objectives to organizational strategy.
C. articulates management’s intent and information security directives in clear language.
D. translates information security policies and standards into business requirements.

A

A. relates the investment to the organization’s strategic plan.

141
Q

The MOST important objective of security awareness training for business staff is to:

A. understand intrusion methods.
B. reduce negative audit findings.
C. increase compliance.
D. modify behavior.

A

D. modify behavior.

142
Q

Which of the following is the PRIMARY responsibility of an information security steering committee?

A. Setting up password expiration procedures
B. Drafting security policies
C. Prioritizing security initiatives
D. Reviewing firewall rules

A

C. Prioritizing security initiatives

143
Q

During a post-incident review, the sequence and correlation of actions must be analyzed PRIMARILY based on:

A. a consolidated event timeline.
B. logs from systems involved.
C. interviews with personnel.
D. documents created during the incident.

A

A. a consolidated event timeline.

144
Q

Which of the following is the MOST important element in the evaluation of inherent security risks?

A. Impact to the organization
B. Control effectiveness
C. Residual risk
D. Cost of countermeasures

A

A. Impact to the organization

145
Q

Recovery time objectives (RTOs) are an output of which of the following?

A. Business continuity plan (BCP)
B. Business impact analysis (BIA)
C. Service level agreement (SLA)
D. Disaster recovery plan (DRP)

A

B. Business impact analysis (BIA)

146
Q

Which of the following is the MOST relevant information to include in an information security risk report to facilitate senior management’s
understanding of impact to the organization?

A. Detailed assessment of the security risk profile
B. Risks inherent in new security technologies
C. Findings from recent penetration testing
D. Status of identified key security risks

A

D. Status of identified key security risks

147
Q

Which of the following is MOST important to include in a contract with a critical service provider to help ensure alignment with the organization’s information security program?

A. Escalation paths
B. Termination language
C. Key performance indicators (KPIs)
D. Right-to-audit clause

A

D. Right-to-audit clause

148
Q

Which of the following is the BEST way to determine if a recent investment in access control software was successful?

A. Senior management acceptance of the access control software
B. A comparison of security incidents before and after software installation
C. A business impact analysis (BIA) of the systems protected by the software
D. A review of the number of key risk indicators (KRIs) implemented for the software

A

B. A comparison of security incidents before and after software installation

149
Q

Which of the following is the MOST effective way to mitigate the risk of confidential data leakage to unauthorized stakeholders?

A. Create a data classification policy.
B. Implement role-based access controls.
C. Require the use of login credentials and passwords.
D. Conduct information security awareness training.

A

B. Implement role-based access controls.

150
Q

Which of the following is the MOST important consideration when reporting the effectiveness of an information security program to key business stakeholders?

A. Linking security metrics to the business impact analysis (BIA)
B. Demonstrating a decrease in information security incidents
C. Demonstrating cost savings of each control
D. Linking security metrics to business objectives

A

D. Linking security metrics to business objectives

151
Q

The PRIMARY purpose of establishing an information security governance framework should be to:

A. establish the business case for strategic integration of information security in organizational efforts.
B. document and communicate how the information security program functions within the organization.
C. align information security strategy and investments to support organizational activities.
D. align corporate governance, activities, and investments to information security goals.

A

C. align information security strategy and investments to support organizational activities.

152
Q

Senior management is concerned that the incident response team took unapproved actions during incident response that put business objectives at risk. Which of the following is the BEST way for the information security manager to respond to this situation?

A. Update roles and responsibilities of the incident response team.
B. Train the incident response team on escalation procedures.
C. Implement a monitoring solution for incident response activities.
D. Validate that the information security strategy maps to corporate objectives.

A

B. Train the incident response team on escalation procedures.

153
Q

An incident response team has determined there is a need to isolate a system that is
communicating with a known malicious host on the Internet.
Which of the following stakeholders should be contacted FIRST?

A. The business owner
B. Key customers
C. Executive management
D. System administrator

A

A. The business owner

154
Q

Which of the following external entities would provide the BEST guidance to an organization facing advanced attacks?

A. Incident response experts from highly regarded peer organizations
B. Open-source reconnaissance
C. Recognized threat intelligence communities
D. Disaster recovery consultants widely endorsed in industry forums

A

C. Recognized threat intelligence communities

155
Q

Which of the following should be an information security manager’s MOST important criterion for determining when to review the incident response plan?

A. When recovery time objectives (RTOs) are not met
B. When missing information impacts recovery from an incident
C. Before an internal audit of the incident response process
D. At intervals indicated by industry best practice

A

D. At intervals indicated by industry best practice

156
Q

During which stage of the software development life cycle (SDLC) should application security controls FIRST be addressed?

A. Software code development
B. Configuration management
C. Requirements gathering
D. Application system design

A

C. Requirements gathering

157
Q

Which of the following should be of MOST concern to an information security manager reviewing an organization’s data classification program?

A. The classifications do not follow industry best practices.
B. Labeling is not consistent throughout the organization.
C. The program allows exceptions to be granted.
D. Data retention requirements are not defined.

A

B. Labeling is not consistent throughout the organization.

158
Q

Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?

A. Recovery strategy
B. Risk mitigation strategy
C. Security strategy
D. IT strategy

A

A. Recovery strategy

159
Q

The MAIN purpose of influenced by a business impact guideline for use within a large, international organization is to:

A. explain the organization’s preferred practices for security.
B. ensure that all business units have the same strategic security goals.
C. ensure that all business units implement identical security procedures.
D. provide evidence for auditors that security practices are adequate.

A

A. explain the organization’s preferred practices for security.

160
Q

Which of the following is an information security manager’s BEST course of action upon discovering an organization with budget constraints lacks
several important security capabilities?

A. Suggest the deployment of open-source security tools to mitigate identified risks.
B. Establish a business case to demonstrate return on investment (ROI) of a security tool.
C. Recommend that the organization avoid the most severe risks.
D. Review the most recent audit report and request funding to address the most serious finding.

A

B. Establish a business case to demonstrate return on investment (ROI) of a security tool.

161
Q

What is the FIRST line of defense against criminal insider activities?

A. Signing security agreements by critical personnel
B. Stringent and enforced access controls
C. Validating the integrity of personnel
D. Monitoring employee activities

A

C. Validating the integrity of personnel

162
Q

The BEST way to report to the board on the effectiveness of the information security program is to present:

A. a summary of the most recent audit findings.
B. a report of cost savings from process improvements.
C. peer-group industry benchmarks.
D. a dashboard illustrating key performance metrics.

A

D. a dashboard illustrating key performance metrics.

163
Q

An organization’s outsourced firewall was poorly configured and allowed unauthorized access that resulted in downtime of 48 hours. Which of the following should be the information security manager’s NEXT course of action?

A. Reconfigure the firewall in accordance with best practices.
B. Obtain supporting evidence that the problem has been corrected.
C. Seek damages from the service provider.
D. Revisit the contract and improve accountability of the service provider.

A

B. Obtain supporting evidence that the problem has been corrected.

164
Q

Which is the MOST important requirement when establishing a process for responding to zero-day vulnerabilities?

A. The IT team updates antivirus signatures on user systems.
B. The IT team implements an emergency patch deployment process.
C. Business users stop using the impacted application until a patch is released.
D. The information security team implements recommended workarounds.

A

D. The information security team implements recommended workarounds.

165
Q

An information security manager has determined that the mean time to prioritize information security incidents has increased to an unacceptable level. Which of the following processes would BEST enable the information security manager to address this concern?

A. Incident classification
B. Incident response
C. Forensic analysis
D. Vulnerability assessment

A

A. Incident classification

166
Q

An information security manager discovers that newly hired privileged users are not taking necessary steps to protect critical information at their workstations.
Which of the following is the BEST way to address this situation?

A. Publish an acceptable use policy and require signed acknowledgment.
B. Turn on logging and record user activity.
C. Communicate the responsibility and provide appropriate training.
D. Implement a data loss prevention (DLP) solution.

A

C. Communicate the responsibility and provide appropriate training.

167
Q

Which of the following should be the MOST important consideration when prioritizing risk remediation?

A. Evaluation of risk
B. Duration of exposure
C. Comparison to risk appetite
D. Impact of compliance

A

C. Comparison to risk appetite

168
Q

To set security expectations across the enterprise, it is MOST important for the information security policy to be regularly reviewed and endorsed by:

A. security administrators.
B. senior management.
C. the chief information security officer (CISO).
D. the IT steering committee.

A

B. senior management.

169
Q

Senior management wants to provide mobile devices to its sales force. Which of the following should the information security manager do FIRST to support this objective?

A. Develop an acceptable use policy
B. Conduct a vulnerability assessment on the devices
C. Assess risks introduced by the technology
D. Research mobile device management (MDM) solutions

A

C. Assess risks introduced by the technology

170
Q

An information security manager needs to ensure security testing is conducted on a new system. Which of the following would provide the
HIGHEST level of assurance?

A. The vendor provides the results of a penetration test and code review.
B. An independent party is directly engaged to conduct testing.
C. The internal audit team is enlisted to run a vulnerability assessment against the system.
D. The security team conducts a self-assessment against a recognized industry framework.

A

B. An independent party is directly engaged to conduct testing.

171
Q

An organization performed a risk analysis and found a large number of assets with low-impact vulnerabilities. The NEXT action of the information security manager should be to:

A. transfer the risk to a third party.
B. determine appropriate countermeasures.
C. report to management.
D. quantify the aggregated risk.

A

D. quantify the aggregated risk.

172
Q

Organization A offers e-commerce services and uses secure transport protocol to protect Internet communication. To confirm communication with Organization A, which of the following would be the BEST for a client to verify?

A. The URL of the e-commerce server
B. The certificate of the e-commerce server
C. The IP address of the e-commerce server
D. The browser’s indication of SSL use

A

B. The certificate of the e-commerce server

173
Q

Which of the following provides the MOST useful information for identifying security control gaps on an application server?

A. Risk assessments
B. Penetration testing
C. Threat models
D. Internal audit reports

A

B. Penetration testing

174
Q

Which of the following components of an information security risk assessment is MOST valuable to senior management?

A. Residual risk
B. Return on investment (ROI)
C. Mitigation actions
D. Threat profile

A

A. Residual risk

175
Q

Which of the following is the PRIMARY benefit of implementing a maturity model for information security management?

A. Gaps between current and desirable levels will be addressed.
B. Information security management costs will be optimized.
C. Information security strategy will be in line with industry best practice.
D. Staff awareness of information security compliance will be promoted.

A

A. Gaps between current and desirable levels will be addressed.

176
Q

An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged.
Which of the following is the BEST automated control to resolve this issue?

A. Integrating automated service level agreement (SLA) reporting into the help desk ticketing system
B. Changing the default setting for all security incidents to the highest priority
C. Integrating incident response workflow into the help desk ticketing system
D. Implementing automated vulnerability scanning in the help desk workflow

A

C. Integrating incident response workflow into the help desk ticketing system

177
Q

An information security manager’s PRIMARY objective for presenting key risks to the board of directors is to:

A. ensure appropriate information security governance.
B. quantify reputational risks.
C. meet information security compliance requirements.
D. re-evaluate the risk appetite.

A

A. ensure appropriate information security governance.

178
Q

Which of the following should be the PRIMARY consideration when implementing a data loss prevention (DLP) solution?

A. Data ownership
B. Data storage capabilities
C. Data classification
D. Selection of tools

A

C. Data classification

179
Q

Which of the following is the MOST important function of an information security steering committee?

A. Evaluating the effectiveness of information security controls on a periodic basis
B. Defining the objectives of the information security framework
C. Conducting regular independent reviews of the state of security in the business
D. Approving security awareness content prior to publication

A

B. Defining the objectives of the information security framework

180
Q

When determining an acceptable risk level, which of the following is the MOST important consideration?

A. Vulnerability scores
B. System criticalities
C. Risk matrices
D. Threat profiles

A

B. System criticalities

181
Q

Which of the following is MOST important to include when reporting information security risk to executive leadership?

A. Key performance objectives and budget trends
B. Security awareness training participation and residual risk exposures
C. Risk analysis results and key risk indicators (KRIs)
D. Information security risk management plans and control compliance

A

C. Risk analysis results and key risk indicators (KRIs)

182
Q

During which of the following development phases is it MOST challenging to implement security controls?

A. Implementation phase
B. Post-implementation phase
C. Design phase
D. Development phase

A

B. Post-implementation phase

183
Q

An employee is found to be using an external cloud storage service to share corporate information with a third-party consultant, which is against company policy.
Which of the following should be the information security manager’s FIRST course of action?

A. Block access to the cloud storage service
B. Determine the classification level of the information
C. Seek business justification from the employee
D. Inform higher management of a security breach

A

B. Determine the classification level of the information

184
Q

Which of the following is the MOST effective method of determining security priorities?

A. Vulnerability assessment
B. Gap analysis
C. Threat assessment
D. Impact analysis

A

D. Impact analysis

185
Q

A measure of the effectiveness of the incident response capabilities of an organization is the:

A. number of incidents detected.
B. number of employees receiving incident response training.
C. reduction of the annual loss expectancy (ALE).
D. time to closure of incidents.

A

D. time to closure of incidents.

186
Q

An organization is in the process of adopting a hybrid data infrastructure, transferring all non-core applications to cloud service providers, and maintaining all core business functions in-house. The information security manager has determined a defense in depth strategy should be used.
Which of the following BEST describes this strategy?

A. Separate security controls for applications, platforms, programs, and endpoints
B. Multi-factor login requirements for cloud service applications, timeouts, and complex passwords
C. Deployment of nested firewalls within the infrastructure
D. Strict enforcement of role-based access control (RBAC)

A

A. Separate security controls for applications, platforms, programs, and endpoints

187
Q

Which of the following is an information security manager’s BEST approach when selecting cost-effective controls needed to meet business objectives?

A. Conduct a gap analysis.
B. Focus on preventive controls.
C. Align with industry best practice.
D. Align with the risk appetite.

A

D. Align with the risk appetite.

188
Q

A risk was identified during a risk assessment. The business process owner has chosen to accept the risk because the cost of remediation is
greater than the projected cost of a worst-case scenario. What should be the information security manager’s NEXT course of action?

A. Document and schedule a date to revisit the issue.
B. Document and escalate to senior management.
C. Shut down the business application.
D. Determine a lower-cost approach to remediation.

A

A. Document and schedule a date to revisit the issue.

189
Q

An organization wants to integrate information security into its human resource management processes. Which of the following should be the FIRST step?

A. Identify information security risk associated with the processes
B. Assess the business objectives of the processes
C. Evaluate the cost of information security integration
D. Benchmark the processes with best practice to identify gaps

A

B. Assess the business objectives of the processes

190
Q

The MOST effective way to continuously monitor an organization’s cybersecurity posture is to evaluate its:

A. compliance with industry regulations.
B. key performance indicators (KPIs).
C. level of support from senior management.
D. timeliness in responding to attacks.

A

B. key performance indicators (KPIs).

191
Q

Which of the following would provide the HIGHEST level of confidence in the integrity of data when sent from one party to another?

A. Harden the communication infrastructure.
B. Require files to be digitally signed before they are transmitted.
C. Enforce multi-factor authentication on both ends of the communication.
D. Require data to be transmitted over a secure connection.

A

B. Require files to be digitally signed before they are transmitted.

192
Q

Which of the following is MOST important to the successful implementation of an information security program?

A. Establishing key performance indicators (KPIs)
B. Obtaining stakeholder input
C. Understanding current and emerging technologies
D. Conducting periodic risk assessments

A

B. Obtaining stakeholder input

193
Q

Which of the following is the BEST way to strengthen the alignment of an information security program with business strategy?

A. Establishing an information security steering committee
B. Increasing the frequency of control assessments
C. Providing organizational training on information security policies
D. Increasing budget for risk assessments

A

A. Establishing an information security steering committee

194
Q

Which of the following is necessary to determine what would constitute a disaster for an organization?

A. Recovery strategy analysis
B. Backup strategy analysis
C. Risk analysis
D. Threat probability analysis

A

C. Risk analysis

195
Q

Management has announced the acquisition of a new company. The information security manager of the parent company is concerned that conflicting access rights may cause critical information to be exposed during the integration of the two companies. To BEST address this concern, the information security manager should:

A. escalate concerns for conflicting access rights to management.
B. review access rights as the acquisition integration occurs.
C. implement consistent access control standards.
D. perform a risk assessment of the access rights.

A

D. perform a risk assessment of the access rights.

196
Q

Which of the following metrics provides the BEST measurement of the effectiveness of a security awareness program?

A. Variance of program cost to allocated budget
B. The number of security breaches
C. Mean time between incident detection and remediation
D. The number of reported security incidents

A

D. The number of reported security incidents

197
Q

The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:

A. the board of directors.
B. the information security officer.
C. the steering committee.
D. the internal audit manager.

A

A. the board of directors.

198
Q

Which of the following is MOST likely to affect an organization’s ability to respond to security incidents in a timely manner?

A. Lack of senior management buy-in
B. Inadequate detective control performance
C. Misconfiguration of security information and event management (SIEM) tool
D. Complexity of network segmentation

A

A. Lack of senior management buy-in

199
Q

After a server has been attacked, which of the following is the BEST course of action?

A. Isolate the system.
B. Initiate incident response.
C. Conduct a security audit.
D. Review vulnerability assessment.

A

B. Initiate incident response.

200
Q

When establishing classifications of security incidents for the development of an incident response plan, which of the following provides the
MOST valuable input?

A. Business impact analysis (BIA) results
B. Recommendations from senior management
C. The business continuity plan (BCP)
D. Vulnerability assessment results

A

A. Business impact analysis (BIA) results