CCISO Study Questions Flashcards
(343 cards)
Question No : 1 - Topic 1 Who in the organization determines access to information? A. Legal department B. Compliance officer C. Data Owner D. Information security officer
Answer : C
Question No : 2 - Topic 1
What is the BEST way to achieve on-going compliance monitoring in an organization?
A. Only check compliance right before the auditors are scheduled to arrive onsite.
B. Outsource compliance to a 3rd party vendor and let them manage the program.
C. Have Compliance and Information Security partner to correct issues as they arise.
D. Have Compliance direct Information Security to fix issues after the auditors report.
Answer : C
Question No : 3 - Topic 1 When dealing with a risk management process, asset classification is important because it will impact the overall: A. Threat identification B. Risk monitoring C. Risk treatment D. Risk tolerance
Answer : C
Question No : 4 - Topic 1
Ensuring that the actions of a set of people, applications and systems follow the
organizations rules is BEST described as:
A. Risk management
B. Security management
C. Mitigation management
D. Compliance management
Answer : D
Question No : 5 - Topic 1
Which of the following is a MAJOR consideration when an organization retains sensitive
customer data and uses this data to better target the organizations products and services?
A. Strong authentication technologies
B. Financial reporting regulations
C. Credit card compliance and regulations
D. Local privacy laws
Answer : D
Question No : 6 - Topic 1
Which of the following is a benefit of information security governance?
A. Questioning the trust in vendor relationships.
B. Increasing the risk of decisions based on incomplete management information.
C. Direct involvement of senior management in developing control processes
D. Reduction of the potential for civil and legal liability
Answer : D
Question No : 7 - Topic 1
In accordance with best practices and international standards, how often is security
awareness training provided to employees of an organization?
A. High risk environments 6 months, low risk environments 12 months
B. Every 12 months
C. Every 18 months
D. Every six months
Answer : B
Question No : 8 - Topic 1
Which of the following is of MOST importance when security leaders of an organization are
required to align security to influence the culture of an organization?
A. Poses a strong technical background
B. Understand all regulations affecting the organization
C. Understand the business goals of the organization
D. Poses a strong auditing background
Answer : C
Question No : 9 - Topic 1
Which of the following is used to establish and maintain a framework to provide assurance
that information security strategies are aligned with organizational objectives?
A. Awareness
B. Compliance
C. Governance
D. Management
Answer : C
Question No : 10 - Topic 1
Which of the following provides an audit framework?
A. Control Objectives for IT (COBIT)
B. Payment Card Industry-Data Security Standard (PCI-DSS)
C. International Organization Standard (ISO) 27002
D. National Institute of Standards and Technology (NIST) SP 800-30
Answer : A
Question No : 11 - Topic 1
The PRIMARY objective of security awareness is to:
A. Ensure that security policies are read.
B. Encourage security-conscious employee behavior.
C. Meet legal and regulatory requirements.
D. Put employees on notice in case follow-up action for noncompliance is necessary
Answer : B
Question No : 12 - Topic 1
When deploying an Intrusion Prevention System (IPS) the BEST way to get maximum
protection from the system is to deploy it
A. In promiscuous mode and only detect malicious traffic.
B. In-line and turn on blocking mode to stop malicious traffic.
C. In promiscuous mode and block malicious traffic.
D. In-line and turn on alert mode to stop malicious traffic.
Answer : B
Question No : 13 - Topic 1
Risk is defined as:
A. Threat times vulnerability divided by control
B. Advisory plus capability plus vulnerability
C. Asset loss times likelihood of event
D. Quantitative plus qualitative impact
Answer : A
Question No : 14 - Topic 1
Which of the following are the MOST important factors for proactively determining system
vulnerabilities?
A. Subscribe to vendor mailing list to get notification of system vulnerabilities
B. Deploy Intrusion Detection System (IDS) and install anti-virus on systems
C. Configure firewall, perimeter router and Intrusion Prevention System (IPS)
D. Conduct security testing, vulnerability scanning, and penetration testing
Answer : D
Question No : 15 - Topic 1 What is the first thing that needs to be completed in order to create a security program for your organization? A. Risk assessment B. Security program budget C. Business continuity plan D. Compliance and regulatory analysis
Answer : A
Question No : 16 - Topic 1
According to ISO 27001, of the steps for establishing an Information Security Governance
program listed below, which comes first?
A. Identify threats, risks, impacts and vulnerabilities
B. Decide how to manage risk
C. Define the budget of the Information Security Management System
D. Define Information Security Policy
Answer : D
Question No : 17 - Topic 1
The framework that helps to define a minimum standard of protection that business
stakeholders must attempt to achieve is referred to as a standard of:
A. Due Protection
B. Due Care
C. Due Compromise
D. Due process
Answer : B
Question No : 18 - Topic 1
Developing effective security controls is a balance between:
A. Risk Management and Operations
B. Corporate Culture and Job Expectations
C. Operations and Regulations
D. Technology and Vendor Management
Answer : A
Question No : 19 - Topic 1
According to the National Institute of Standards and Technology (NIST) SP 800-40, which
of the following considerations are MOST important when creating a vulnerability
management program?
A. Susceptibility to attack, mitigation response time, and cost
B. Attack vectors, controls cost, and investigation staffing needs
C. Vulnerability exploitation, attack recovery, and mean time to repair
D. Susceptibility to attack, expected duration of attack, and mitigation availability
Answer : A
Question No : 20 - Topic 1
The Information Security Management program MUST protect:
A. all organizational assets
B. critical business processes and /or revenue streams
C. intellectual property released into the public domain
D. against distributed denial of service attacks
Answer : B
Question No : 21 – Topic 1
A company wants to fill a Chief Information Security Officer position in the organization.
They need to define and implement a more holistic security program. Which of the following
qualifications and experience would be MOST desirable to find in a candidate?
A. Multiple certifications, strong technical capabilities and lengthy resume
B. Industry certifications, technical knowledge and program management skills
C. College degree, audit capabilities and complex project management
D. Multiple references, strong background check and industry certifications
Answer : B
Question No : 22 - Topic 1
In which of the following cases, would an organization be more prone to risk acceptance
vs. risk mitigation?
A. The organization uses exclusively a quantitative process to measure risk
B. The organization uses exclusively a qualitative process to measure risk
C. The organization’s risk tolerance is high
D. The organization’s risk tolerance is lo
Answer : C
Question No : 23 - Topic 1 Within an organizations vulnerability management program, who has the responsibility to implement remediation actions? A. Security officer B. Data owner C. Vulnerability engineer D. System administrator
Answer : D
Question No : 24 - Topic 1
An organization information security policy serves to
A. establish budgetary input in order to meet compliance requirements
B. establish acceptable systems and user behavior
C. define security configurations for systems
D. define relationships with external law enforcement agencies
Answer : B