Deck 1 Flashcards
(282 cards)
Which of the following should be the PRIMARY basis for a severity hierarchy for information security incident classification?
A. Legal and Regulatory requirements
B. Root cause analysis results
C. Availability of resources
D. Adverse effects on the business
D
An information security manager has become aware that a third-party provider is not in compliance with the statement of work (SOW). Which of the following is the BEST course of action?
A. Assess the extent of the issue
B. Report the issue to legal personnel
C. Notify senior management of the issue
D. Initiate contract renegotiation
A
Which of the following would be MOST useful to help senior management understand the status of information security compliance?
A. Key performance indicators (KPIs)
B. Risk assessment results
C. Industry benchmarks
D. Business impact analysis (BIA) results
A
An organization is concerned with the potential for exploitation of vulnerabilities in its server systems. Which of the following is the BEST control to mitigate the associated risk?
A. Enforcing standard System configurations based on secure configuration benchmarks
B. Implementing network and system-based anomaly monitoring software for server systems
C. Enforcing configurations for secure logging and audit trails on server systems
D. Implementing host-based intrusion detection systems (IDS) on server systems
A
An organization has identified a risk scenario that has low impact to the organization but is very costly to mitigate. Which risk treatment option is MOST appropriate in this situation?
A. Transfer
B. Acceptance
C. Mitigation
D. Avoidance
A
Which of the following should be the MAIN outcome from monitoring key performance indicators (KPIs) for a corporate security management program?
A. A balanced scorecard
B. An effective awareness program
C. Data for the organization to assess progress
D. Optimal level of value delivery
C
Which of the following defines the triggers within a business continuity plan (BCP)?
A. Disaster recovery plan (DRP)
B. Needs of the organization
C. Information security policy
D. Gap analysis
B
Which of the following should be the MOST important consideration of business continuity management?
A. Ensuring human safety
B. Securing critical information assets
C. Ensuring the reliability of backup data
D. Identifying critical business processes
A
Which of the following should be the PRIMARY driver for delaying the delivery of an information security awareness program?
A. Change in senior management
B. High employee turnover
C. Employee acceptance
D. Risk appetite
D
During the eradication process phase of an incident response, it is MOST important to:
A. Identify the root cause
B. Restore from the most recent backup
C. Notify affected users
D. Wipe the affected system
D
Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?
A. Defining security asset categorization
B. Assigning information asset ownership
C. Developing a records retention schedule
D. Defining information stewardship roles
A
The GREATEST benefit resulting from well-documented information security procedures is that they
A. Facilitate security training of new staff
B. Ensure that security policies are consistently applied
C. Provide a basis for auditing security practices
D. Ensure processes can be followed by temporary staff
B
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager’s BEST course of action?
A. Present the risk to senior management
B. Modify the policy
C. Create an exception for the deviation
D. Enforce the policy
A
Which of the following should be the PRIMARY consideration when developing an incident response plan?
A. Previously reported incidents
B. Management support
C. Compliance with regulations
D. The definition of an incident
D
Which of the following tasks should be performed once a disaster recovery plan (DRP) has been developed?
A. Identify recovery time objectives (RTOs)
B. Develop a test plan
C. Analyze the business impact
D. Define response team roles
B
An anomaly-based intrusion detection system (IDS) operates by gathering data on:
A. Normal network behavior and using it as a baseline for measuring abnormal activity
B. Abnormal network behavior and using it as a baseline for measuring normal activity
C. Abnormal network behavior and using it as a baseline for measuring normal activity
D. Attack pattern signatures from historical data
A
An organization that uses external cloud services extensively is concern with risk monitoring and timely response. The BEST way to address this concern is to ensure:
A. The availability of continuous technical support
B. Appropriate service level agreements (SLAs) are in place
C. a right-to-audit clause is included in contracts
D. Internal security standards are in place
C
The security baselines of an organization should be based on:
A. procedures
B. standards
C. policies
D. guidelines
B
An employee clicked on a link in a phishing email, triggering a ransomeware attack. Which of the following should be the information security manager’s FIRST step?
A. Notify internal legal
B. Isolate the impacted endpoints
C. Wipe the affected system
D. Notify senior management
B
which of the following is most important for an information security manager to communicate to stakeholders when approving exceptions to the information security policy?
A. impact of the risk profile
B. Need for compensating controls
C. Time period for a review
D. Requirements for senior management reporting
A
The main purpose of documenting information security guidelines for use within a large, international organization is to:
A. explain the organization’s preferred practices for security
B. ensure that all business units have the same strategic security goals
C. Ensure that all business units implement identical security postures
D. provide evidence for authors that security practices are adequate
A
A penetration test of a new system has identified a number of critical vulnerabilities, jeopardizing the go live date. Stop it the information security manager is asked by the system owner to approve an exception to allow the system to be implemented without fixing the vulnerabilities. Which of the following is the most appropriate course of action?
A. Implement a long monitoring process
B. perform a risk assessment
C. develop a set of compensating controls
D. approve and document the exception
B
Which of the following is the most important consideration when developing information security objectives?
A. They are regularly reassessed and reported to stakeholders
B. They are approved by the IT governance function
C. They are clear and can be understood by stakeholders
D. they are identified using global security frameworks and standards
C
Which of the following is most important to the successful implementation of an information security program?
A. Establishing key performance indicators (KPI’s)
B. Obtaining stakeholder input
C. understanding current and emerging technologies
D. conducting periodic risk assessments
B