When entering into a third party vendor agreement for security services, at what point in the process is it BEST to understand and validate the security posture and compliance level of the vendor?
As the Risk Manager of an organization, you are task with managing vendor risk assessments. During the assessment, you identified that the vendor is engaged with high profiled clients, and bad publicity can jeopardize your own brand.
Which is the BEST type of risk that defines this event?
Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.
What is one proven method to account for common elements found within separate regulations and/or standards?
Scenario: As you begin to develop the program for your organization, you assess the corporate culture and determine that there is a pervasive opinion that the security program only slows things down and limits the performance of the “real workers.”
What must you do first in order to shift the prevailing opinion and reshape corporate culture to understand the value of information security to the organization?
Which of the following compliance standards is the MOST common among retail businesses?
Which of the following is the MOST effective method for discovering common technical vulnerabilities within the
IT environment?
Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?
Providing oversight of a comprehensive information security program for the entire organization is the primary responsibility of which group under the InfoSec governance framework?
When updating the security strategic planning document what two items must be included?
Which of the following is critical in creating a security program aligned with an organization’s goals?
Risk appetite directly affects what part of a vulnerability management program?
Using the Transport Layer Security (TLS) protocol enables a client in a network to be:
What is the MOST probable explanation for a security policy that is often ignored and unenforced?
A global retail company is creating a new compliance management process. Which of the following regulations is of MOST importance to be tracked and managed by this process?
A CISO must conduct risk assessments using a method where the Chief Financial Officer (CFO) receives impact data in financial terms to use as input to select the proper level of coverage in a new cybersecurity insurance policy.
What is the MOST effective method of risk analysis to provide the CFO with the information required?
A security professional has been promoted to be the CISO of an organization. The first task is to create a security policy for this organization. The CISO creates and publishes the security policy. This policy however, is ignored and not enforced consistently. Which of the following is the MOST likely reason for the policy shortcomings?
What are the primary reasons for the development of a business case for a security project?
A missing/ineffective security control is identified. Which of the following should be the NEXT step?
The security team has investigated the theft/loss of several unencrypted laptop computers containing sensitive corporate information. To prevent the loss of any additional corporate data it is unilaterally decided by the CISO that all existing and future laptop computers will be encrypted. Soon, the help desk is flooded with complaints about the slow performance of the laptops and users are upset. What did the CISO do wrong? (choose the BEST answer):
The effectiveness of social engineering penetration testing using phishing can be used as a Key Performance Indicator (KPI) for the effectiveness of an organization’s
You are evaluating an audit report and notice it only contains lists of findings and technical diagrams. What additional component should be integrated?
Your IT auditor is reviewing significant events from the previous year and has identified some procedural oversights. Which of the following would be the MOST concerning?
Enforcing the implementation and management of security controls within services or products offered by third-party providers is a vital component of which security program service to the business?
A severe security threat has been detected on your corporate network. As CISO you quickly assemble key members of the Information Technology team and business operations to determine a modification to security controls in response to the threat. This is an example of:
After a risk assessment is performed, a particular risk is considered to have the potential of costing the organization 1.2 Million USD. This is an example of
What is the next step after defining the conditions under which standard security controls must be applied?
Which of the following has the PRIMARY responsibility for determining access rights requirements to information?
Which of the following is the MOST important reason to measure the effectiveness of an Information Security Management System (ISMS)?
Which of the following is the MOST effective method to measure the effectiveness of security controls in a perimeter network?
Payment Card Industry (PCI) compliance requirements are based on what criteria?
Which of the following is the BEST reason for having a formal Request for Proposal (RFP) process?
What can you do to assist with law enforcement investigations if someone on your guest wireless network is suspected of committing an illegal act using your network?
Which of the following international standards can be BEST used to define a Risk Management process in an organization?
In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:
When performing a forensic investigation, what are the two MOST common sources for obtaining computer evidence?
Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.
When adjusting the controls to mitigate the risks, how often should the CISO perform an audit to verify the controls?
Optical biometric recognition such as retina scanning provides access to facilities through reading the unique characteristics of a person’s eye.
However, authorization failures can occur with individuals who have?
Which of the following is used to lure attackers into false environments so they can be monitored, contained, or blocked from reaching critical systems?
Which level of data destruction applies logical techniques to sanitize data in all user-addressable storage locations?
Which of the following best represents a calculation for Annual Loss Expectancy (ALE)?
Your company has limited resources to spend on security initiatives. The Chief Financial Officer asks you to prioritize the protection of information resources based on their value to the company. It is essential that you be able to communicate in language that your fellow executives will understand. You should:
One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?
According to the National Institute of Standards and Technology (NIST) SP 800-40, which of the following considerations are MOST important when creating a vulnerability management program?
Which of the following is the MOST effective way to measure the effectiveness of security controls on a perimeter network?
The company decides to release the application without remediating the high-risk vulnerabilities. Which of the following is the MOST likely reason for the company to release the application?
Which of the following functions evaluates patches used to close software vulnerabilities of new systems to assure compliance with policy when implementing an information security program?
What is the MOST important result of the management response within the audit process?
Which of the following is a MAJOR consideration when an organization retains sensitive customer data and uses this data to better target the organization’s products and services?
When would it be more desirable to develop a set of decentralized security policies and procedures within an enterprise environment?
A person in your security team calls you at night and informs you that one of your web applications is potentially under attack from a cross-site scripting vulnerability. What do you do?
Who is responsible for oversight of an information security program within an organization?
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
The CISO has validated audit findings, determined if compensating controls exist, and started initial remediation planning. Which of the following is the MOST logical next step?
An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?
During a cyber incident, which of the following non-security personnel will MOST likely be required to assist the incident response team?
Of the following types of SOCs (Security Operations Centers), which one would be MOST likely used if the CISO has decided to outsource the infrastructure and administration of it?
What are the security features that control how users and systems communicate and interact with other systems and resources?
Which of the following is MOST beneficial in determining an appropriate balance between uncontrolled innovation and excessive caution in an organization?
With a focus on the review and approval aspects of board responsibilities, the Data Governance Council recommends that the boards provide strategic oversight regarding information and information security, include these four things:
Which of the following is the MOST important action of an Information Security Steering Committee?
Which of the following is considered the foundation for the Enterprise Information Security Architecture (EISA)?
A CISO sees abnormally high volumes of exceptions to security requirements and constant pressure from business units to change security processes. Which of the following represents the MOST LIKELY cause of this situation?
The Annualized Loss Expectancy (Before) minus Annualized Loss Expectancy (After) minus Annual Safeguard Cost is the formula for determining:
A business unit within your organization intends to deploy a new technology in violation of information security standards. As a security leader, what would be your BEST course of action?
XYZ is a publicly-traded software development company.
Who is ultimately accountable to the shareholders in the event of a cybersecurity breach?
Which of the following is of MOST importance when security leaders of an organization are required to align security to influence the culture of an organization?
What Enterprise Architecture Framework is business-centric and is composed of eight phases?
Which of the following strategies provides the BEST response to a ransomware attack?
A security manager regualrly checks work areas after buisness hours for security violations; such as unsecured files or unattended computers with active sessions. This activity BEST demonstrates what part of a security program?
Scenario: As you begin to develop the program for your organization, you assess the corporate culture and determine that there is a pervasive opinion that the security program only slows things down and limits the performance of the “real workers.”
Which group of people should be consulted when developing your security program?
Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY covered by which of the following plans?
The amount of risk an organization is willing to accept in pursuit of its mission is known as
With respect to the audit management process, management response serves what function?
A Security Operations Center (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen, and the database server was disconnected. Who must be informed of this incident?
Which of the following information may be found in table top exercises for incident response?
Creating good security metrics is essential for a CISO. What would be the BEST sources for creating security metrics for baseline defenses coverage?
You have been hired as the Information System Security Officer (ISSO) for a US federal government agency. Your role is to ensure the security posture of the system is maintained. One of your tasks is to develop and maintain the system security plan (SSP) and supporting documentation.
Which of the following is NOT documented in the SSP?
Which of the following is considered the MOST effective tool against social engineering?
Which of the following is the BEST method to manage data that no longer provides business value?
Which of the following is a weakness of an asset or group of assets that can be exploited by one or more threats?
Physical security measures typically include which of the following types of controls?
An international organization is planning a project to implement encryption technologies to protect company confidential information. This organization has data centers on three continents. Which of the following would be considered a MAJOR constraint for the project?
Which of the following is the MOST important for a CISO to understand when identifying threats?
Which of the following represents the best method of ensuring business unit alignment with security program requirements?
You have recently drafted a revised information security policy. From whom should you seek endorsement in order to have the GREATEST chance for adoption and implementation throughout the entire organization?
An organization recently acquired a Data Loss Prevention (DLP) solution, and two months after the implementation, it was found that sensitive data was posted to numerous Dark Web sites. The DLP application was checked, and there are no apparent malfunctions and no errors.
What is the MOST likely reason why the sensitive data was posted?
Within an organization’s vulnerability management program, who has the responsibility to implement remediation actions?
What is the GREATEST benefit of having an effective security governance process?
How often should the Statements of Standards for Attestation Engagements-16 (SSAE16)/International Standard on Assurance Engagements 3402 (ISAE3402) report of your vendors be reviewed?
What is defined as the friction or opposition resulting from actual or perceived differences or incompatibilities?
An organization has implemented a change management process for all changes to the IT production environment. This change management process follows best practices and is expected to help stabilize the availability and integrity of the organization’s IT environment. Which of the following can be used to measure the effectiveness of this newly implemented process:
When working in the Payment Card Industry (PCI), how often should security logs be review to comply with the standards?
Which of the following methodologies references the recommended industry standard that Information security project managers should follow?
If a Virtual Machine’s (VM) data is being replicated and that data is corrupted, this corruption will automatically
be replicated to the other machine(s). What would be the BEST control to safeguard data integrity?
When performing a forensic investigation, what are the two MOST common data sources for obtaining evidence from a computer and mobile devices?
The remediation of a specific audit finding is deemed too expensive and will not be implemented. Which of the following is a TRUE statement?
When managing the critical path of an IT security project, which of the following is MOST important?
Which of the following is considered to be an IT governance framework and a supporting toolset that allows for managers to bridge the gap between control requirements, technical issues, and business risks?
When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?
The new CISO was informed of all the Information Security projects that the organization has in progress. Two projects are over a year behind schedule and over budget. Using best business practices for project management you determine that the project correctly aligns with the company goals.
Which of the following needs to be performed NEXT?
Due to staff shortages during off-hours, the Security Operations Center (SOC) manager is considering outsourcing off-hour coverage. What type of SOC is being considered?
When gathering security requirements for an automated business process improvement program, which of the following is MOST important?
To make sure that the actions of all employees, applications, and systems follow the organization’s rules and regulations can BEST be described as which of the following?
An organization’s firewall technology needs replaced. A specific technology has been selected that is less costly than others and lacking in some important capabilities. The security officer has voiced concerns about sensitive data breaches but the decision is made to purchase. What does this selection indicate?
An organization has decided to develop an in-house BCM capability. The organization has determined it is best to follow a BCM standard published by the International Organization for Standardization (ISO).
The BEST ISO standard to follow that outlines the complete lifecycle of BCM is?
Which of the following is used to establish and maintain a framework to provide assurance that information security strategies are aligned with organizational objectives?
Which of the following terms is used to describe countermeasures implemented to minimize risks to physical
property, information, and computing systems?
What role does the statement of retained earnings serve within the financial reporting of an organization?
What is the MAIN reason for conflicts between Information Technology and Information Security programs?
Which of the following methods are used to define contractual obligations that force a vendor to meet customer expectations?
A cloud computing environment that is bound together by technology that allows data and applications to be shared between public and private clouds is BEST referred to as a?
When deploying an Intrusion Prevention System (IPS) the BEST way to get maximum protection from the system is to deploy it
When developing the Business Impact Assessment (BIA), which of the following MOST closely relates to data backup and restoration?
In what phase of an incident management process will malware antivirus signatures be distributed to infrastructure?
Which of the following would provide a view into the current liabilities of a company?
If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of business,
they just have to find a job opening, prepare someone to pass the interview, have that person hired, and they
will be in the organization. How would you prevent such type of attacks?
What is the BEST way to achieve on-going compliance monitoring in an organization?
What principle is used when a CISO evaluates controls to ensure they satisfy the organization’s operational needs?
You are just hired as the new CISO and are being briefed on all the Information Security projects that your section has on going. You discover that most projects are behind schedule and over budget.
Using the best business practices for project management you determine that the project correct aligns with the company goals. What needs to be verified FIRST?
The purpose of NIST SP 800-53 as part of the NIST System Certification and Accreditation Project is to establish a set of standardized, minimum security controls for IT systems addressing low, moderate, and high levels of concern for
Which one of the following BEST describes which member of the management team is accountable for the day-to-day operation of the information security program?
While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?
How often should an environment be monitored for cyber threats, risks, and exposures?
When an organization claims it is secure because it is PCI-DSS certified, what is a good first question to ask towards assessing the effectiveness of their security program?
The MOST common method to get an unbiased measurement of the effectiveness of an Information Security Management System (ISMS) is to
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
The CISO has implemented remediation activities. Which of the following is the MOST logical next step?
A security team member calls you to inform you that one of your databases might have been compromised, but there are no details available. As the security leader, what should you do?
In which of the following cases, would an organization be more prone to risk acceptance vs. risk mitigation?
Which of the following set of processes is considered to be one of the cornerstone cycles of the International Organization for Standardization (ISO) 27001 standard?
When analyzing and forecasting a capital expense budget what are not included?
Which of the following BEST describes an international standard framework that is based on the security model Information Technology—Code of Practice for Information Security Management?
When dealing with a risk management process, asset classification is important because it will impact the overall:
During an initial investigation, the Incident Response Team suspects criminal activity but cannot initially prove or disprove illegal actions. What is the MOST critical action they should take?
When assessing internal control objectives, what are the auditor's PRIMARY concerns?
You are the CISO for an investment banking firm. The firm is using artificial intelligence (AI) to assist in approving clients for loans.
Which control is MOST important to protect AI products?
Scenario: Your company has many encrypted telecommunications links for their world-wide operations. Physically distributing symmetric keys to all locations has proven to be administratively burdensome, but symmetric keys are preferred to other alternatives.
Symmetric encryption in general is preferable to asymmetric encryption when:
ABC Limited has recently suffered a security breach with customers’ social security number available on the dark web for sale. The CISO, during the time of the incident, has been fired, and you have been hired as the replacement. The analysis of the breach found that the absence of an insider threat program, lack of least privilege policy, and weak access control was to blame. You would like to implement key performance indicators to mitigate the risk.
Which metric would meet the requirement?
Which of the following governing bodies defines best practices for the collection of technological evidence?
Which of the following is a term related to risk management that represents the estimated frequency at which a threat is expected to transpire?
This occurs when the quantity or quality of project deliverables is expanded from the original project plan.
Which of the following is MOST useful when developing a business case for security initiatives?
Which of the following would negatively impact a log analysis of a multinational organization?
The executive board has requested that the CISO define Key Performance Indicators (KPIs) to measure the effectiveness of the security awareness program. Which information would be MOST useful?
Which of the following organizations is typically in charge of validating the implementation and effectiveness of security controls?
What oversight should the information security team have in the change management process for application security?
As the CISO, you have been tasked with the execution of the company’s key management program. You
MUST ensure the integrity of encryption keys at the point of generation. Which principal of encryption key
control will ensure no single individual can constitute or re-constitute a key?
Which of the following is the MOST effective technology to counter phishing attacks?
An organization licenses and uses personal information for business operations, and a server containing that information has been compromised. What kind of law would require notifying the owner or licensee of this incident?
Which of the following would BEST provide a comprehensive, independent, and certifiable perspective of security controls in an environment?