Work Flashcards
When analyzing and forecasting a capital expense budget what are not included?
Network connectivity costs
New datacenter to operate from
Upgrade of mainframe
Purchase of new mobile devices to improve operations
Network connectivity costs
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified
The CISO has implemented remediation activities. Which of the following is the MOST logical next step?
Validate the effectiveness of applied controls
Validate security program resource requirements
Report the audit findings and remediation status to business stake holders
Review security procedures to determine if they need modified according to findings
Validate the effectiveness of applied controls
Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.
When adjusting the controls to mitigate the risks, how often should the CISO perform an audit to verify the controls?
Annually
Semi-annually
Quarterly
Never
Never
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and dat Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
Once supervisors and data owners have approved requests, information system administrators will implement
Technical control(s)
Management control(s)
Policy control(s)
Operational control(s)
Technical control(s)
Scenario: You are the CISO and are required to brief the C-level executive team on your information security audit for the year. During your review of the audit findings you discover that many of the controls that were put in place the previous year to correct some of the findings are not performing as neede You have thirty days until the briefing. To formulate a remediation plan for the non-performing controls what other document do you need to review before adjusting the controls?
Business Impact Analysis
Business Continuity plan
Security roadmap
Annual report to shareholders
Business Impact Analysis
The process to evaluate the technical and non-technical security controls of an IT system to validate that a given design and implementation meet a specific set of security requirements is called
Security certification
Security system analysis
Security accreditation
Alignment with business practices and goals.
Security certification
When creating contractual agreements and procurement processes why should security requirements be included?
To make sure they are added on after the process is completed
To make sure the costs of security is included and understood
To make sure the security process aligns with the vendor’s security process
To make sure the patching process is included with the costs
To make sure the costs of security is included and understood
What is the primary reason for performing vendor management?
To understand the risk coverage that are being mitigated by the vendor
To establish a vendor selection process
To document the relationship between the company and the vendor
To define the partnership for long-term success
To understand the risk coverage that are being mitigated by the vendor
Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda. Which of the following is the reason the CISO has not been able to advance the security agenda in this organization?
Lack of identification of technology stake holders
Lack of business continuity process
Lack of influence with leaders outside IT
Lack of a security awareness program
Lack of influence with leaders outside IT
The new CISO was informed of all the Information Security projects that the organization has in progress. Two projects are over a year behind schedule and over budget. Using best business practices for project management you determine that the project correctly aligns with the company goals.
Which of the following needs to be performed NEXT?
Verify the scope of the project
Verify the regulatory requirements
Verify technical resources
Verify capacity constraints
Verify technical resources
You are just hired as the new CISO and are being briefed on all the Information Security projects that your section has on going. You discover that most projects are behind schedule and over budget.
Using the best business practices for project management you determine that the project correctly aligns with the company goals and the scope of the project is correct. What is the NEXT step?
Review time schedules
Verify budget
Verify resources
Verify constraints
Verify resources
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified
After determining the audit findings are accurate, which of the following is the MOST logical next activity?
Begin initial gap remediation analyses
Review the security organization’s charter
Validate gaps with the Information Technology team
Create a briefing of the findings for executive management
Begin initial gap remediation analyses
SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organizations needs.
The CISO is unsure of the information provided and orders a vendor proof of concept to validate the systems scalability. This demonstrates which of the following?
An approach that allows for minimum budget impact if the solution is unsuitable
A methodology-based approach to ensure authentication mechanism functions
An approach providing minimum time impact to the implementation schedules
A risk-based approach to determine if the solution is suitable for investment
A risk-based approach to determine if the solution is suitable for investment
Involvement of senior management is MOST important in the development of:
IT security implementation plans.
Standards and guidelines.
IT security policies.
IT security procedures.
IT security policies.
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and dat Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
What type of control is being implemented by supervisors and data owners?
Management
Operational
Technical
Administrative
Operational
Which of the following provides an independent assessment of a vendors internal security controls and overall posture?
Alignment with business goals
ISO27000 accreditation
PCI attestation of compliance
Financial statements
ISO27000 accreditation
Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.
You have decided to deal with risk to information from people first. How can you minimize risk to your most sensitive information before granting access?
Conduct background checks on individuals before hiring them
Develop an Information Security Awareness program
Monitor employee browsing and surfing habits
Set your firewall permissions aggressively and monitor logs regularly.
Conduct background checks on individuals before hiring them
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
Which of the following is the FIRST action the CISO will perform after receiving the audit report?
Inform peer executives of the audit results
Validate gaps and accept or dispute the audit findings
Create remediation plans to address program gaps
Determine if security policies and procedures are adequate
Validate gaps and accept or dispute the audit findings
Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.
When multiple regulations or standards apply to your industry you should set controls to meet the:
Easiest regulation or standard to implement
Stricter regulation or standard
Most complex standard to implement
Recommendations of your Legal Staff
Easiest regulation or standard to implement
Human resource planning for security professionals in your organization is a:
Simple and easy task because the threats are getting easier to find and correct.
Training requirement that is met through once every year user training.
Training requirement that is on-going and always changing.
Not needed because automation and anti-virus software has eliminated the threats.
Training requirement that is on-going and always changing.
Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agend The CISO has been able to implement a number of technical controls and is able to influence the Information Technology teams but has not been able to influence the rest of the organization. From an organizational perspective, which of the following is the LIKELY reason for this?
The CISO does not report directly to the CEO of the organization
The CISO reports to the IT organization
The CISO has not implemented a policy management framework
The CISO has not implemented a security awareness program
The CISO reports to the IT organization
As the CISO you need to write the IT security strategic plan. Which of the following is the MOST important to review before you start writing the plan?
The existing IT environment.
The company business plan.
The present IT budget.
Other corporate technology trends.
The company business plan.
CENARIO: Critical servers show signs of erratic behavior within your organizations intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
In what phase of the response will the team extract information from the affected systems without altering original data?
Response
Investigation
Recovery
Follow-up
Investigation
Scenario: Your company has many encrypted telecommunications links for their world-wide operations. Physically distributing symmetric keys to all locations has proven to be administratively burdensome, but symmetric keys are preferred to other alternatives.
How can you reduce the administrative burden of distributing symmetric keys for your employer?
Use asymmetric encryption for the automated distribution of the symmetric key
Use a self-generated key on both ends to eliminate the need for distribution
Use certificate authority to distribute private keys
Symmetrically encrypt the key and then use asymmetric encryption to unencrypt it
Use asymmetric encryption for the automated distribution of the symmetric key
The process for management approval of the security certification process which states the risks and mitigation of such risks of a given IT system is called
Security certification
Security system analysis
Security accreditation
Alignment with business practices and goals.
Security accreditation
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and dat Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
Recently, members of your organization have been targeted through a number of sophisticated phishing attempts and have compromised their system credentials. What action can you take to prevent the misuse of compromised credentials to change bank account information from outside your organization while still allowing employees to manage their bank information?
Turn off VPN access for users originating from outside the country
Enable monitoring on the VPN for suspicious activity
Force a change of all passwords
Block access to the Employee-Self Service application via VPN
Block access to the Employee-Self Service application via VPN
Scenario: You are the newly hired Chief Information Security Officer for a company that has not previously had a senior level security practitioner. The company lacks a defined security policy and framework for their Information Security Program. Your new boss, the Chief Financial Officer, has asked you to draft an outline of a security policy and recommend an industry/sector neutral information security control framework for implementation. Your Corporate Information Security Policy should include which of the following?
Information security theory
Roles and responsibilities
Incident response contacts
Desktop configuration standards
Roles and responsibilities
Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?
Trusted and untrusted networks
Type of authentication
Storage encryption
Log retention
Trusted and untrusted networks
What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?
Traffic Analysis
Deep-Packet inspection
Packet sampling
Heuristic analysis
Deep-Packet inspection
When should IT security project management be outsourced?
When organizational resources are limited
When the benefits of outsourcing outweigh the inherent risks of outsourcing
On new, enterprise-wide security initiatives
On projects not forecasted in the yearly budget
When the benefits of outsourcing outweigh the inherent risks of outsourcing
Which of the following is considered one of the most frequent failures in project management?
Overly restrictive management
Excessive personnel on project
Failure to meet project deadlines
Insufficient resources
Failure to meet project deadlines
Which of the following represents the best method of ensuring business unit alignment with security program requirements?
Provide clear communication of security requirements throughout the organization
Demonstrate executive support with written mandates for security policy adherence
Create collaborative risk management approaches within the organization
Perform increased audits of security processes and procedures
Create collaborative risk management approaches within the organization