An organization is required to implement background checks on all employees with access to databases containing credit card information. This is considered a security
Creating a secondary authentication process for network access would be an example of?
Which of the following is considered to be an IT governance framework and a supporting toolset that allows for managers to bridge the gap between control requirements, technical issues, and business risks?
When working in the Payment Card Industry (PCI), how often should security logs be review to comply with the standards?
A new CISO just started with a company and on the CISO's desk is the last complete Information Security Management audit report. The audit report is over two years old. After reading it, what should be the CISO's FIRST priority?
The MOST common method to get an unbiased measurement of the effectiveness of an Information Security Management System (ISMS) is to
An organization has implemented a change management process for all changes to the IT production environment. This change management process follows best practices and is expected to help stabilize the availability and integrity of the organization’s IT environment. Which of the following can be used to measure the effectiveness of this newly implemented process:
Which of the following activities must be completed BEFORE you can calculate risk?
Creating good security metrics is essential for a CISO. What would be the BEST sources for creating security metrics for baseline defenses coverage?
The CIO of an organization has decided to assign the responsibility of internal IT audit to the IT team. This is consider a bad practice MAINLY because
As a new CISO at a large healthcare company you are told that everyone has to badge in to get in the building. Below your office window you notice a door that is normally propped open during the day for groups of people to take breaks outside. Upon looking closer you see there is no badge reader. What should you do?
As the Chief Information Security Officer, you are performing an assessment of security posture to understand
what your Defense-in-Depth capabilities are. Which network security technology examines network traffic flows
to detect and actively stop vulnerability exploits and attacks?
What are the three hierarchically related aspects of strategic planning and in which order should they be done?
Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.
The organization has already been subject to a significant amount of credit card fraud. Which of the following is the MOST likely reason for this fraud?
Which of the following terms is used to describe countermeasures implemented to minimize risks to physical
property, information, and computing systems?
What process defines the framework of rules and practices by which a board of directors ensure accountability, fairness and transparency in an organization's relationship with its shareholders?
Scenario: As you begin to develop the program for your organization, you assess the corporate culture and determine that there is a pervasive opinion that the security program only slows things down and limits the performance of the “real workers.”
Which group of people should be consulted when developing your security program?
Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.
When formulating the remediation plan, what is a required input?
Which of the following provides an independent assessment of a vendor’s internal security controls and overall posture?
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
After determining the audit findings are accurate, which of the following is the MOST logical next activity?
Which regulation or policy governs protection of personally identifiable user data gathered during a cyber investigation?
As the CISO you need to write the IT security strategic plan. Which of the following is the MOST important to review before you start writing the plan?
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
Which of the following is the FIRST action the CISO will perform after receiving the audit report?
Simon had all his systems administrators implement hardware and software firewalls to ensure network
security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized
traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker
group was able to get into the network and modify files hosted on the company's website. After searching
through the firewall and server logs, no one could find how the attackers were able to get in. He decides that
the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts
administrators when a critical file is altered. What tool could Simon and his administrators implement to
accomplish this?
What is one key difference between Capital expenditures and Operating expenditures?
When project costs continually increase throughout implementation due to large or rapid changes in customer
or user requirements, this is commonly known as:
The formal certification and accreditation process has four primary steps, what are they?
When analyzing and forecasting an operating expense budget what are not included?
Which of the following is used to lure attackers into false environments so they can be monitored, contained, or blocked from reaching critical systems?
Optical biometric recognition such as retina scanning provides access to facilities through reading the unique characteristics of a person’s eye.
However, authorization failures can occur with individuals who have?
XYZ is a publicly-traded software development company.
Who is ultimately accountable to the shareholders in the event of a cybersecurity breach?
The Board of Directors of a publicly-traded company is concerned about the security implications of a strategic project that will migrate 50% of the organization’s information technology assets to the cloud. They have requested a briefing on the project plan and a progress report of the security stream of the project. As the CISO, you have been tasked with preparing the report for the Chief Executive Officer to present.
Using the Earned Value Management (EVM), what does a Cost Variance (CV) of -1,200 mean?
In defining a strategic security plan for an organization, what should a CISO first analyze?
To make sure that the actions of all employees, applications, and systems follow the organization’s rules and regulations can BEST be described as which of the following?
Of the following types of SOCs (Security Operations Centers), which one would be MOST likely used if the CISO has decided to outsource the infrastructure and administration of it?
A CISO must conduct risk assessments using a method where the Chief Financial Officer (CFO) receives impact data in financial terms to use as input to select the proper level of coverage in a new cybersecurity insurance policy.
What is the MOST effective method of risk analysis to provide the CFO with the information required?
With a focus on the review and approval aspects of board responsibilities, the Data Governance Council recommends that the boards provide strategic oversight regarding information and information security, include these four things:
When managing a project, the MOST important activity in managing the expectations of stakeholders is:
What is an approach to estimating the strengths and weaknesses of alternatives used to determine options, which provide the BEST approach to achieving benefits while preserving savings called?
Who should be involved in the development of an internal campaign to address email phishing?
The primary responsibility for assigning entitlements to a network share lies with which role?
When evaluating a Managed Security Services Provider (MSSP), which service(s) is/are most important:
Which of the following provides the BEST approach to achieving positive outcomes while preserving savings?
Which of the following is the MOST effective method to counter phishing attacks?
Which of the following statements below regarding Key Performance indicators (KPIs) are true?
When obtaining new products and services, why is it essential to collaborate with lawyers, IT security professionals, privacy professionals, security engineers, suppliers, and others?
When performing a forensic investigation, what are the two MOST common data sources for obtaining evidence from a computer and mobile devices?
Which of the following organizations is typically in charge of validating the implementation and effectiveness of security controls?
The BEST organization to provide a comprehensive, independent and certifiable perspective on established security controls in an environment is
With respect to the audit management process, management response serves what function?
Which of the following is a benefit of a risk-based approach to audit planning?
Which of the following is the MOST effective way to measure the effectiveness of security controls on a perimeter network?
How often should an environment be monitored for cyber threats, risks, and exposures?
Control Objectives for Information and Related Technology (COBIT) is which of the following?
The effectiveness of social engineering penetration testing using phishing can be used as a Key Performance Indicator (KPI) for the effectiveness of an organization’s
In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:
What type of attack requires the least amount of technical equipment and has the highest success rate?
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks
2.Scanning and enumeration
3.Maintaining Access
4.Reconnaissance
5.Gaining Access
Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?
A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?
Security related breaches are assessed and contained through which of the following?
Your organization provides open guest wireless access with no captive portals. What can you do to assist with law enforcement investigations if one of your guests is suspected of committing an illegal act using your network?
Which of the following is a countermeasure to prevent unauthorized database access from web applications?
SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?
Which of the following is the MAIN security concern for public cloud computing?
Your incident handling manager detects a virus attack in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the incident handling process will utilize the signature to resolve this incident?
The process for identifying, collecting, and producing digital information in support of legal proceedings is called
Physical security measures typically include which of the following components?
What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?
The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?
One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?
Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?
The process of creating a system which divides documents based on their security level to manage access to private data is known as
Which of the following represents the BEST method for obtaining business unit acceptance of security controls within an organization?
Which of the following represents the best method of ensuring business unit alignment with security program requirements?
Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?
Which of the following is critical in creating a security program aligned with an organization’s goals?
Which of the following is considered one of the most frequent failures in project management?
Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?
The organization does not have the time to remediate the vulnerability; however it is critical to release the application. Which of the following needs to be further evaluated to help mitigate the risks?
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how hardware and software is implemented and managed within the organization. Which of the following principles does this best demonstrate?
How often should the Statements of Standards for Attestation Engagements-16 (SSAE16)/International Standard on Assurance Engagements 3402 (ISAE3402) report of your vendors be reviewed?
To get an Information Security project back on schedule, which of the following will provide the MOST help?
As the CISO for your company you are accountable for the protection of information resources commensurate with:
Which of the following is MOST beneficial in determining an appropriate balance between uncontrolled innovation and excessive caution in an organization?
Which of the following methodologies references the recommended industry standard that Information security project managers should follow?
An organization has a stated requirement to block certain traffic on networks. The implementation of controls will disrupt a manufacturing process and cause unacceptable delays, resulting in sever revenue disruptions. Which of the following is MOST likely to be responsible for accepting the risk until mitigating controls can be implemented?
A severe security threat has been detected on your corporate network. As CISO you quickly assemble key members of the Information Technology team and business operations to determine a modification to security controls in response to the threat. This is an example of:
Which of the following methods are used to define contractual obligations that force a vendor to meet customer expectations?
An international organization is planning a project to implement encryption technologies to protect company confidential information. This organization has data centers on three continents. Which of the following would be considered a MAJOR constraint for the project?
When entering into a third party vendor agreement for security services, at what point in the process is it BEST to understand and validate the security posture and compliance level of the vendor?
Which of the following is a weakness of an asset or group of assets that can be exploited by one or more threats?
When dealing with Security Incident Response procedures, which of the following steps come FIRST when reacting to an incident?
In which of the following cases, would an organization be more prone to risk acceptance vs. risk mitigation?
After a risk assessment is performed, a particular risk is considered to have the potential of costing the organization 1.2 Million USD. This is an example of
Quantitative Risk Assessments have the following advantages over qualitative risk assessments:
According to ISO 27001, of the steps for establishing an Information Security Governance program listed below, which comes first?
If your organization operates under a model of "assumption of breach", you should:
When dealing with a risk management process, asset classification is important because it will impact the overall:
What is the first thing that needs to be completed in order to create a security program for your organization?
What is the BEST way to achieve on-going compliance monitoring in an organization?
An organization licenses and uses personal information for business operations, and a server containing that information has been compromised. What kind of law would require notifying the owner or licensee of this incident?
A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should the information security manager take?
You have implemented a new security control. Which of the following risk strategy options have you engaged in?
Which of the following has the GREATEST impact on the implementation of an information security governance model?
Which of the following is MOST important when dealing with an Information Security Steering committee:
Which of the following is the MAIN reason to follow a formal risk management process in an organization that hosts and uses privately identifiable information (PII) as part of their business models and processes?
Which of the following international standards can be BEST used to define a Risk Management process in an organization?
Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?
What is a difference from the list below between quantitative and qualitative Risk Assessment?