To make sure that the actions of all employees, applications, and systems follow the organization’s rules and regulations can BEST be described as which of the following?
When performing a forensic investigation, what are the two MOST common data sources for obtaining evidence from a computer and mobile devices?
A Security Operations (SecOps) Manager is considering implementing threat hunting to be able to make better decisions on protecting information and assets.
What is the MAIN goal of threat hunting to the SecOps Manager?
What is the name of a formal statement that defines the strategy, approach, or expectations related to specific concerns within an organization:
What is a key goal of information security?
Of the following types of SOCs (Security Operations Centers), which one would be MOST likely used if the CISO has decided to outsource the infrastructure and administration of it?
What does RACI stand for?
Which of the following is the MOST effective method to counter phishing attacks?
With a focus on the review and approval aspects of board responsibilities, the Data Governance Council recommends that the boards provide strategic oversight regarding information and information security, include these four things:
From the CISO’s perspective in looking at financial statements, the statement of retained earnings of an organization:
Which of the following is the MOST effective way to secure the physical hardware hosts in a virtualized environment?
An organization recently acquired a Data Loss Prevention (DLP) solution, and two months after the implementation, it was found that sensitive data was posted to numerous Dark Web sites. The DLP application was checked, and there are no apparent malfunctions and no errors.
What is the MOST likely reason why the sensitive data was posted?
Who should be involved in the development of an internal campaign to address email phishing?
Which of the following is the MOST important to share with an Information Security Steering Committee:
Which of the following is NOT an approach for ethical decision making?
What Enterprise Architecture Framework is business-centric and is composed of eight phases?
Which of the following is considered the MOST effective tool against social engineering?
What standard would you use to help determine key performance indicators?
You are the CISO for an investment banking firm. The firm is using artificial intelligence (AI) to assist in approving clients for loans.
Which control is MOST important to protect AI products?
Providing oversight of an information security program for the organization is the primary responsibility of which group?
What organizational structure combines the functional and project structures to create a hybrid of the two?
Which of the following provides the BEST approach to achieving positive outcomes while preserving savings?
UESTION NO: 459
A company wants to fill a Chief Information Security Officer position. Which of the following qualifications and experience would be MOST desirable in a candidate?
You have been promoted to the CISO of a retail store. Which of the following compliance standards is the MOST important to the organization?
The main purpose of the SOC is:
What are the common data hiding techniques used by criminals?
The ability to require implementation and management of security controls within third-party provided services is a critical part of:
When gathering security requirements for an automated business process improvement program, which of the following is MOST important?
Which of the following areas are beyond the duties of the CISO?
You have been promoted to the CISO of a big-box retail store chain reporting to the Chief Information Officer (CIO). The CIO’s first mandate to you is to develop a cybersecurity compliance framework that will meet all the store’s compliance requirements.
Which of the following compliance standard is the MOST important to the organization?
When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?
You have purchased a new insurance policy as part of your risk strategy. Which of the following risk strategy options have you engaged in?
What two methods are used to assess risk impact?
A security manager has created a risk program. Which of the following is a critical part of ensuring the program is successful?
Assigning the role and responsibility of Information Assurance to a dedicated and independent security group is an example of:
Which of the following is MOST important when dealing with an Information Security Steering committee:
Which of the following is the MOST important goal of risk management?
The Information Security Governance program MUST:
Why is it vitally important that senior management endorse a security policy?
Which of the following is a term related to risk management that represents the estimated frequency at which a threat is expected to transpire?
In MOST organizations which group periodically reviews network intrusion detection system logs for all systems as part of their daily tasks?
Which of the following reports should you as an IT auditor use to check on compliance with a service level agreement’s requirement for uptime?
Which of the following BEST describes an international standard framework that is based on the security model Information Technology—Code of Practice for Information Security Management?
Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY covered by which of the following plans?
Which of the following is the MAIN reason to follow a formal risk management process in an organization that hosts and uses privately identifiable information (PII) as part of their business models and processes?
At which point should the identity access management team be notified of the termination of an employee?
When an organization claims it is secure because it is PCI-DSS certified, what is a good first question to ask towards assessing the effectiveness of their security program?
The FIRST step in establishing a security governance program is to?
What is the definition of Risk in Information Security?
You work as a project manager for TYU project. You are planning for risk mitigation. You need to quickly identify high-level risks that will need a more in-depth analysis. Which of the following activities will help you in this?
Which of the following set of processes is considered to be one of the cornerstone cycles of the International Organization for Standardization (ISO) 27001 standard?
Which of the following is a fundamental component of an audit record?
In which of the following cases, would an organization be more prone to risk acceptance vs. risk mitigation?
When a CISO considers delaying or not remediating system vulnerabilities which of the following are MOST important to take into account?
What is the MAIN reason for conflicts between Information Technology and Information Security programs?
The alerting, monitoring and life-cycle management of security related events is typically handled by the
Which of the following best represents a calculation for Annual Loss Expectancy (ALE)?
Which of the following is a MAJOR consideration when an organization retains sensitive customer data and uses this data to better target the organization’s products and services?
Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?
Which of the following represents the HIGHEST negative impact resulting from an ineffective security governance program?
You currently cannot provide for 24/7 coverage of your security monitoring and incident response duties and your company is resistant to the idea of adding more full-time employees to the payroll. Which combination of solutions would help to provide the coverage needed without the addition of more dedicated staff? (choose the best answer):
When operating under severe budget constraints a CISO will have to be creative to maintain a strong security organization. Which example below is the MOST creative way to maintain a strong security posture during these difficult times?
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how hardware and software is implemented and managed within the organization. Which of the following principles does this best demonstrate?
Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?
As the CISO for your company you are accountable for the protection of information resources commensurate with:
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how hardware and software is implemented and managed within the organization. Which of the following principles does this best demonstrate?
Acme Inc. has engaged a third party vendor to provide 99.999% up-time for their online web presence and had them contractually agree to this service level agreement. What type of risk tolerance is Acme exhibiting? (choose the BEST answer):
The organization does not have the time to remediate the vulnerability; however it is critical to release the application. Which of the following needs to be further evaluated to help mitigate the risks?
You manage a newly created Security Operations Center (SOC), your team is being inundated with security alerts and don’t know what to do. What is the BEST approach to handle this situation?
An international organization is planning a project to implement encryption technologies to protect company confidential information. This organization has data centers on three continents. Which of the following would be considered a MAJOR constraint for the project?
When is an application security development project complete?
Which of the following represents the BEST method for obtaining business unit acceptance of security controls within an organization?
A CISO sees abnormally high volumes of exceptions to security requirements and constant pressure from business units to change security processes. Which of the following represents the MOST LIKELY cause of this situation?
Risk appetite is typically determined by which of the following organizational functions?
In order for a CISO to have true situational awareness there is a need to deploy technology that can give a real-time view of security events across the enterprise. Which tool selection represents the BEST choice to achieve situational awareness?
When should IT security project management be outsourced?
Which of the following is considered a project versus a managed process?
A department within your company has proposed a third party vendor solution to address an urgent, critical business need. As the CISO you have been asked to accelerate screening of their security control claims. Which of the following vendor provided documents is BEST to make your decision:
Your company has a “no right to privacy” notice on all logon screens for your information systems and users sign an Acceptable Use Policy informing them of this condition. A peer group member and friend comes to you and requests access to one of her employee’s email account. What should you do? (choose the BEST answer):
An organization has a stated requirement to block certain traffic on networks. The implementation of controls will disrupt a manufacturing process and cause unacceptable delays, resulting in sever revenue disruptions. Which of the following is MOST likely to be responsible for accepting the risk until mitigating controls can be implemented?
How often should the Statements of Standards for Attestation Engagements-16 (SSAE16)/International Standard on Assurance Engagements 3402 (ISAE3402) report of your vendors be reviewed?
A CISO implements smart cards for credential management, and as a result has reduced costs associated with help desk operations supporting password resets. This demonstrates which of the following principles?
How often should the SSAE16 report of your vendors be reviewed?
In effort to save your company money which of the following methods of training results in the lowest cost for the organization?
Which of the following is critical in creating a security program aligned with an organization’s goals?
This occurs when the quantity or quality of project deliverables is expanded from the original project plan.
Which of the following represents the BEST method of ensuring security program alignment to business needs?
When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?
A person in your security team calls you at night and informs you that one of your web applications is potentially under attack from a cross-site scripting vulnerability. What do you do?
What oversight should the information security team have in the change management process for application security?
Your incident handling manager detects a virus attack in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the incident handling process will utilize the signature to resolve this incident?
An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?
The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?
While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?
The process of creating a system which divides documents based on their security level to manage access to private data is known as
Which of the following is the MAIN security concern for public cloud computing?
Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?
In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:
A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks
2.Scanning and enumeration
3.Maintaining Access
4.Reconnaissance
5.Gaining Access
Security related breaches are assessed and contained through which of the following?
An anonymity network is a series of?
Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?
The process of identifying and classifying assets is typically included in the
What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?
Which of the following backup sites takes the longest recovery time?
The process for identifying, collecting, and producing digital information in support of legal proceedings is called
Your organization provides open guest wireless access with no captive portals. What can you do to assist with law enforcement investigations if one of your guests is suspected of committing an illegal act using your network?
Which of the following is a countermeasure to prevent unauthorized database access from web applications?
SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?
You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?
Which of the following statements about Encapsulating Security Payload (ESP) is true?
Which wireless encryption technology makes use of temporal keys?
What is the FIRST step in developing the vulnerability management program?
Physical security measures typically include which of the following components?
What type of attack requires the least amount of technical equipment and has the highest success rate?
Which of the following is a symmetric encryption algorithm?
The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?
One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?
What is meant by password aging?
Scenario: The new CISO was informed of all the Information Security projects that the section has in progress. Two projects are over a year behind schedule and way over budget.
Using the best business practices for project management, you determine that the project correctly aligns with the organization goals. What should be verified next?
Scenario: You are the CISO and are required to brief the C-level executive team on your information security audit for the year. During your review of the audit findings you discover that many of the controls that were put in place the previous year to correct some of the findings are not performing as needed. You have thirty days until the briefing.
To formulate a remediation plan for the non-performing controls what other document do you need to review before adjusting the controls?
As the CISO, you have been tasked with the execution of the company’s key management program. You
MUST ensure the integrity of encryption keys at the point of generation. Which principal of encryption key
control will ensure no single individual can constitute or re-constitute a key?
A system is designed to dynamically block offending Internet IP-addresses from requesting services from a secure website. This type of control is considered
SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.
The CISO is unsure of the information provided and orders a vendor proof of concept to validate the system’s scalability. This demonstrates which of the following?
The ability to demand the implementation and management of security controls on third parties providing services to an organization is
When updating the security strategic planning document what two items must be included?
Which of the following provides an independent assessment of a vendor’s internal security controls and overall posture?
As the Chief Information Security Officer, you are performing an assessment of security posture to understand
what your Defense-in-Depth capabilities are. Which network security technology examines network traffic flows
to detect and actively stop vulnerability exploits and attacks?
SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.
The CISO discovers the scalability issue will only impact a small number of network segments. What is the next logical step to ensure the proper application of risk management methodology within the two-facto implementation project?
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
What type of control is being implemented by supervisors and data owners?
You are just hired as the new CISO and are being briefed on all the Information Security projects that your section has on going. You discover that most projects are behind schedule and over budget.
Using the best business practices for project management you determine that the project correctly aligns with the company goals and the scope of the project is correct. What is the NEXT step?
The formal certification and accreditation process has four primary steps, what are they?
The new CISO was informed of all the Information Security projects that the organization has in progress. Two projects are over a year behind schedule and over budget. Using best business practices for project management you determine that the project correctly aligns with the company goals.
Which of the following needs to be performed NEXT?
A CISO has implemented a risk management capability within the security portfolio. Which of the following
terms best describes this functionality?
What is one key difference between Capital expenditures and Operating expenditures?
A CISO wants to change the defense strategy to ward off attackers. To accomplish this the CISO is looking to a strategy where attackers are lured into a zone of a safe network where attackers can be monitored, controlled, quarantined, or eradicated.
A newly-hired CISO needs to understand the organization’s financial management standards for business units
and operations. Which of the following would be the best source of this information?
Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.
You have decided to deal with risk to information from people first. How can you minimize risk to your most sensitive information before granting access?
Which of the following is the MOST logical method of deploying security controls within an organization?
Which of the following is a primary method of applying consistent configurations to IT systems?
A large number of accounts in a hardened system were suddenly compromised to an external party. Which of
the following is the MOST probable threat actor involved in this incident?
Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.
What is one proven method to account for common elements found within separate regulations and/or standards?
The process to evaluate the technical and non-technical security controls of an IT system to validate that a given design and implementation meet a specific set of security requirements is called
Simon had all his systems administrators implement hardware and software firewalls to ensure network
security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized
traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker
group was able to get into the network and modify files hosted on the company's website. After searching
through the firewall and server logs, no one could find how the attackers were able to get in. He decides that
the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts
administrators when a critical file is altered. What tool could Simon and his administrators implement to
accomplish this?
What is the primary reason for performing vendor management?
Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.
Which of the following is the reason the CISO has not been able to advance the security agenda in this organization?