Pool of 300, 200 Random
A security officer intends to implement a vulnerability scanning set-up. The officer is unsure of the state of vulnerability strength within the corporation's huge IT infrastructure
What would be the MOST SUITABLE tactic to reduce scan information output while retaining an accurate interpretation of system vulnerability?
Countless times a CISO may have to speak to the Board of Directors (BOD) about their cyber security position.
What would be the MOST SUITABLE option of security metrics to give to the BOD?
After studying it, what should be the CISO's FOREMOST priority?
Which of the given can be used to measure the efficiency of this newly implemented procedure?
A system was hardened at the Operating System level and placed into the production environment. Months later an audit was done and it identified unprotected configuration different from the original hardened state.
Which of the given security concerns is the MOST expected cause leading to the audit findings?
An audit was conducted and many serious applications were found to have no disaster recovery plans in place. You conduct a Business Impact Analysis (BIA) to control impact to the company for each application.
What should be the NEXT move?
Acme Inc. has involved a third party vendor to provide 99.999% up-time for their online web presence and had them contractually agree to this service level agreement.
What type of risk tolerance is Acme exhibiting?
You at present cannot offer for 24/7 coverage of your security monitoring and incident response duties and your company is unwilling to the idea of adding more full-time employees to the payroll.
Which combination of solutions would help to provide the coverage needed without the addition of more devoted staff?
A department within your company has suggested a third party vendor solution to address a pressing, critical business need. As the CISO you have been required to accelerate screening of their security control claims.
Which of the given vendor provided documents is MOST SUITABLE to make your decision?
A serious security threat has been identified on your corporate network. As CISO you rapidly assemble key members of the Information Technology team and business operations to control a modification to security controls in response to the threat.
This is an instance of:
A CISO chooses to examine the IT infrastructure to guarantee security solutions stick to the conceptions of how hardware and software is implemented and managed within the corporation.
Which of the given values does this most appropriately demonstrate?
You manage a newly formed Security Operations Center (SOC), your team is being flooded with security alerts and don't know what to do.
What is the MOST SUITABLE method to control this situation?
An application vulnerability assessment has recognized a security fault in an application. This is a fault that was formerly recognized and remediated on a previous release of the application.
Which of the given is MOST expected the reason for this recurring issue?
The security team has investigated the theft/loss of numerous unencrypted laptop computers comprising vulnerable corporate information. To avert the loss of any additional corporate information it is individually decided by the CISO that all present and future laptop computers will be encrypted. Soon, the help desk is flooded with complaints about the slow performance of the laptops and users are upset.
What did the CISO do incorrect?
A CISO has just joined a corporation with a poorly implemented security set up. The need is to base the security set-up on a risk management approach.
Which of the given is a initial requirement in order to start this sort of set up?
Your company has incomplete resources to spend on security initiatives. The Chief Financial Officer asks you to arrange the security of information resources based on their value to the company. It is important that you be able to communicate in language that your fellow executives will understand.
You should:
You are having a penetration test done on your company network and the leader of the team says they learnt all the network devices since no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults.
Which of the given is a default community string?
As the CISO you need to write the IT security strategic plan.
Which of the given is the MOST important to review before you start writing the plan?
Your incident handling manager notices a virus attack in the network of your company.
You change a signature based on the characteristics of the identified virus.
Which of the given stages in the incident handling process will utilize the signature to resolve this incident?
A system is intended to enthusiastically block offending Internet IP addresses from requesting services from a secure website.
This kind of control is believed_____________________
A customer of a bank has placed a dispute on a payment for a credit card account The banking system uses digital signatures to safeguard the integrity of their transactions.
The bank claims that the system shows proof that the customer in fact made the payment.
What is this system capability generally identified as?
The general ledger setup fun
What is the most predictable reason for such wide access?
Situation: You are the CISO and have just accomplished your first risk assessment for your corporation. You find many risks with no security controls, and few risks with insufficient controls. You assign work to your staff to make or regulate existing security controls to guarantee they are satisfactory for risk mitigation needs.
When formulating the remediation plan, what is a required input?
Situation: You are the freshly appointed Chief Information Security Officer for a company that has not before had a senior level security practitioner. The company lacks a defined security policy and framework for their Information Security Set-up. Your new boss, the Chief Financial Officer, has asked you to draft an outline of a security policy and suggest an industry/sector neutral information security control framework for application.
Your Corporate Information Security Policy should contain which of the given?
Situation: Most industries involve compliance with multiple government regulations and/or industry standards to meet information security and privacy mandates. What is one recognized way to account for common elements found within separate regulations and/or standards?
Situation: Your set-up is developed around minimizing risk to information by focusing on people, technology, and operations. You have decided to deal with risk to information from people first.
How can you diminish risk to your most vulnerable information before allowing access?
Situation: A Chief Information Security Officer (CISO) just had a third party conduct an audit of the security set-up. Internal policies and international standards were used as audit baselines. The audit report was offered to the CISO and a variety of high, medium and low rated gaps were recognized. The CISO has authenticated audit findings, determined if compensating controls exist, and started initial remediation planning.
Which of the given is the MOST rational next move?
Situation: A corporation has made a decision to address Information Security properly and consistently by adopting established most suitable practices and industry standards. The corporation is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.
Which of the given frameworks and standards will MOST SUITABLE fit the corporation as a baseline for their security set-up?
Situation: A CISO has numerous two-factor verification systems under review and chooses the one that is most adequate and least costly. The application project planning is finalized and the teams are ready to implement the solution. The CISO then determines that the product it is not as scalable as in the beginning thought and will not fit the corporation's requirements
What is the MOST rational course of action the CISO should take?
Situation: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have done well under the stress. You are confident that your defenses have held up under the test, but rumors are spreading that vulnerable customer information has been stolen and is now being sold on the Internet by criminal elements.
During your investigation of the believed compromise you determine that information has been breached and you have exposed the repository of stolen information on a server located in a foreign country. Your team now has full access to the information on the foreign server.
What action should you take EARLIEST?
Situation: Your corporation employs single sign-on (user name and password only) as a convenience to your employees to access corporalional systems and information. Permission to individual systems and information nbasesis vetted and permitted through supervisors and information owners to ensure that only permitted personnel can use certain applications or retrieve information.
All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self Service application. All employees have access to the corporational VPN. The corporation wants a more permanent solution to the threat to user credential compromise through phishing.
What technical solution would MOST SUITABLE address this matter?
Situation: You are the freshly appointed Chief Information Security Officer for a company that has not formerly had a senior level security practitioner. The company lacks a described security policy and framework for their Information Security Set-up. Your new boss, the Chief Financial Officer, has asked you to draft an outline of a security policy and recommend an industry/sector neutral information security control framework for a application.
Which of the given industry/ sector neutral information security control frameworks should you mention for application?
Situation: You are the CISO and are wanted to brief the C-level executive team on your information security audit for the year. During your review of the audit findings you determine that many of the controls that were put in place the preceding year to correct few of the findings are not performing as required. You have thirty days until the briefing.
To formulate a remediation plan for the non-performing controls what other document do you need to review before adjusting the controls?
Situation: A corporation has only just appointed a CISO. This is a new role in the corporation and it signals the growing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to progress the IT security centric agenda.
From an Information Security Leadership perspective, which of the given is a MAJOR distress about the CISO's methodology to security?
Situation: Your corporation employs single sign-on (user name and password only) as a convenience to your employees to access corporational systems and information. Permission to individual systems and information bases is vetted and permitted through supervisors and information owners to ensure that only permitted personnel can use certain applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the corporational VPN.
Once supervisors and information owners have permitted requests, information system administrators will implement:
Situation: Critical servers show signs of erratic behavior within your corporation's Intranet. Preliminary information shows the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO). you decide to organize the Incident Response Team (IRT) to determine the particulars of this incident and take action according to the information available to the team. During early investigation, the team suspects criminal action but cannot originally prove or disprove illegal actions.
What is the MOST serious aspect of the team's activities?
Situation: Numerous industries entail compliance with multiple government regulations and/or industry standards to meet information security and privacy mandates. When multiple regulations or standards
apply to your industry you should set controls to meet the
Situation: You are the CISO and have just accomplished your first risk assessment for your corporation. You find many risks with no security
controls, and few risks with insufficient controls. You assign work to your staff to generate or regulate existing security controls to guarantee they are satisfactory for risk mitigation needs. You have identified capability solutions for all of your risks that do not have security controls.
What is the NEXT move?
You are just appointed as the new CISO and are being briefed on all the Information Security projects that your section has on going. You discover that most projects are behind schedule and over budget. Using the most suitable business practices for project management you determine that the project correctly aligns with the company aims and the scope of the project is correct
What is the NEXT move?
Situation: Critical servers show signs of erratic performance within your corporation's intranet. Primary information shows the systems are under
attack from an outside entity. As the Chief Information Security Officer (CISO), you choose to organize the Incident Response Team (IRT) to determine the particulars of this incident and take action according to the information accessible to the team.
What phase of the response provides measures to reduce the likelihood of an incident from recurring?
Situation: A Chief Information Security Officer (CISO) in recent times had a third party conduct an audit of the security set-up. Internal policies and international standards were used as audit baselines. The audit report was offered to the CISO and a variety of high, medium and low rated gaps were identified. The CISO has implemented remediation activities.
Which of the given is the MOST rational next move?
Situation: Your corporation employs single sign-on (user name and
password only) as a convenience to your employees to access corporational systems and information. Permission to individual systems and information bases is vetted and accepted through supervisors and information owners to guarantee that only appropriate personnel can use certain applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the corporational VPN. Recently, members of your corporation have been directed through a number of sophisticated phishing tries and have compromised their system credentials
What action can you take to prevent the misuse of compromised credentials to change bank account information from outside your corporation while still allowing employees to manage their bank information?
Situation: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The application project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the corporation's needs. The CISO is unsure of the information provided and orders a vendor proof of concept to validate the system's scalability.
This exhibits which of the given?
Sitluation: Your corporation employs single sign-on (user name and password only) as a convenience to your employees to access corporational systems and information. Permission to individual systems and information bases is vetted and permitted through supervisors and information owners to ensure that only permitted personnel can use certain applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. Alt employees have access to the corporational VPN.
What type of control is being implemented by supervisors and information owners?
Situation: A corporation has made a decision to address Information Security formally and consistently by adopting established most suitable practices and industry standards. The corporation is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years. This global retail company is expected to accept credit card payments.
Which of the given is of MOST concern when defining a security set-up for this corporation?
Situation: A corporation has made a decision to address Information Security properly and reliably by accepting recognized most suitable practices and industry standards. The corporation is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.
Which of the given would be the FIRST move when addressing Information Security properly and reliably in this corporation?
Situation: A corporation has just employed a CISO. This is a new role in the corporation and it signals the growing need to address security reliably at the enterprise level. This new CISO, though confident with skills and experience, is continually on the defensive and is incapable to advance the IT security centric agenda.
Which of the given is the cause the CISO has not been able to advance the security agenda in this corporation?
Situation: Your company has numerous encrypted telecommunications links for their world-wide operations. Actually distributing symmetric keys to all locations has verified to be administratively burden few, but symmetric keys are favored to other alternatives.
Symmetric encryption in general is preferable to asymmetric encryption when:
Situation: A CISO has quite a few two-factor verification systems under review and chooses the one that is most adequate and least costly. The application project planning is completed and the teams are ready to implement the solution. The CISO then determines that the product it is not as scalable as formerly thought and will not fit the corporation's requirements. The CISO discovers the scalability matter will only impact a small number of network segments.
What is the subsequent balanced move to guarantee the correct application of risk management methodology within the two-factor application project?
Situation: Your company has many encrypted telecommunications links for their world-wide operations. Actually distributing symmetric keys to all locations has proven to be administratively burden few, but symmetric keys are chosen to otheralternatives.
How can you decrease the administrative burden of distributing symmetric keys for your employer?
Situation: Critical servers show signs of erratic behavior within your corporation's intranet. Initial information shows the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
In what phase of the response will the team extract information from the affected systems without altering original information?
Bob waits near a secure door, holding a box. He waits until an employee walks up to the secure door and uses the distinctive card in order to access the limited area of the direct company. Just as the employee opens the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so that he can enter. What is the most appropriate manner to undermine the social engineering action of tailgating?
A consultant is appointed to do physical penetration testing at a huge financial company. In the first day of his assessment, the consultant goes to the company's building dressed like an electrician and waits in the lobby for an employee to pass through the chief access gate, then the consultant follows the employee behind to get into the restricted area. Which kind of attack did the consultant perform?
A CISO chooses to analyze the IT infrastructure to guarantee security solutions stand by to the conceptions of how hardware and software is implemented and managed within the corporation. Which of the given values does this most appropriately determine?