Which of the following is often the final stage in the information management lifecycle?
Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD) within the Information Security sphere?
What physical security control would be used to broadcast false emanations to mask the presence of true electromagentic emanations from genuine computing equipment?
Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?
Which of the following types of organisation could be considered the MOST at risk from the theft of electronic based credit card data?
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
Why have MOST European countries developed specific legislation that permits police and security services to monitor communications traffic for specific purposes, such as the detection of crime?
A security analyst has been asked to provide a triple A service (AAA) for both wireless and remote access network services in an organization and must avoid using proprietary solutions.
What technology SHOULD they adapt?
What type of diagram used in application threat modeling includes malicious users as well as descriptions like mitigates and threatens?
Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?
Ensuring the correctness of data inputted to a system is an example of which facet of information security?
What form of attack against an employee has the MOST impact on their compliance with the organisation's "code of conduct"?
When an organisation decides to operate on the public cloud, what does it lose?
What term is used to describe the testing of a continuity plan through a written scenario being used as the basis for discussion and simul-ation?
Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
By what means SHOULD a cloud service provider prevent one client accessing data belonging to another in a shared server environment?
Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?
1. Intellectual Property Rights.
2. Protection of Organisational Records
3. Forensic recovery of data.
4. Data Deduplication.
5. Data Protection & Privacy.