Which of the following is the MOST effective way to measure the effectiveness of security controls on a perimeter network?
An organization licenses and uses personal information for business operations, and a server containing that information has been compromised. What kind of law would require notifying the owner or licensee of this incident?
A security officer wants to implement a vulnerability scanning program. The officer is uncertain of the state of vulnerability resiliency within the organization’s large IT infrastructure. What would be the BEST approach to minimize scan data output while retaining a realistic view of system vulnerability?
When a critical vulnerability has been discovered on production systems and needs to be fixed immediately, what is the BEST approach for a CISO to mitigate the vulnerability under tight budget constraints?
According to the National Institute of Standards and Technology (NIST) SP 800-40, which of the following considerations are MOST important when creating a vulnerability management program?
What is the BEST way to achieve on-going compliance monitoring in an organization?
In MOST organizations which group periodically reviews network intrusion detection system logs for all systems as part of their daily tasks?
How often should an environment be monitored for cyber threats, risks, and exposures?
Which of the following provides an audit framework?
Which of the following best describes the purpose of the International Organization for Standardization (ISO) 27002 standard?
Who is responsible for securing networks during a security incident?
In accordance with best practices and international standards, how often is security awareness training provided to employees of an organization?
An employee successfully avoids becoming a victim of a sophisticated spear phishing attack due to knowledge gained through the corporate information security awareness program. What type of control has been effectively utilized?
Payment Card Industry (PCI) compliance requirements are based on what criteria?
A Chief Information Security Officer received a list of high, medium, and low impact audit findings. Which of the following represents the BEST course of action?
When an organization claims it is secure because it is PCI-DSS certified, what is a good first question to ask towards assessing the effectiveness of their security program?
Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY covered by which of the following plans?
The remediation of a specific audit finding is deemed too expensive and will not be implemented. Which of the following is a TRUE statement?
In which of the following cases, would an organization be more prone to risk acceptance vs. risk mitigation?
The mean time to patch, number of virus outbreaks prevented, and number of vulnerabilities mitigated are examples of what type of performance metrics?
The Information Security Management program MUST protect:
Which of the following are primary concerns for management with regard to assessing internal control objectives?
Which of the following intellectual Property components is focused on maintaining brand recognition?
Within an organization’s vulnerability management program, who has the responsibility to implement remediation actions?
Which of the following international standards can be BEST used to define a Risk Management process in an organization?
Risk appetite directly affects what part of a vulnerability management program?
Which of the following is the PRIMARY purpose of International Organization for Standardization (ISO) 27001?
The PRIMARY objective of security awareness is to:
A method to transfer risk is to:
When briefing senior management on the creation of a governance process, the MOST important aspect should be:
Which security technologies are MOST critical to implementing a zero trust model?
What Enterprise Architecture Framework is business-centric and is composed of eight phases?
Which of the following refers to the quantity or quality of project deliverables expanding from the original project plan?
In which of the following cases would an organization be more prone to risk acceptance vs. risk mitigation?
While Cost Benefit Analysis (CBA) is the easiest calculation among financial tools, what is its main weakness?
Which of the following statements below regarding Key Performance indicators (KPIs) are true?
From the CISO’s perspective in looking at financial statements, the statement of retained earnings of an organization:
Which of the following is the MOST effective way to secure the physical hardware hosts in a virtualized environment?
Which of the following areas are beyond the duties of the CISO?
When reviewing a Solution as a Service (SaaS) provider’s security health and posture, which key document should you review?
You have been promoted to the CISO of a big-box retail store chain reporting to the Chief Information Officer (CIO). The CIO’s first mandate to you is to develop a cybersecurity compliance framework that will meet all the store’s compliance requirements.
Which of the following compliance standard is the MOST important to the organization?
What is defined as the friction or opposition resulting from actual or perceived differences or incompatibilities?
An organization recently acquired a Data Loss Prevention (DLP) solution, and two months after the implementation, it was found that sensitive data was posted to numerous Dark Web sites. The DLP application was checked, and there are no apparent malfunctions and no errors.
What is the MOST likely reason why the sensitive data was posted?
What is protected by Federal Information Processing Standards (FIPS) 140-2?
Over 90% of successful cyber-attacks currently include: Social engineering
What is the purpose of the statement of retained earnings of an organization?
The alerting, monitoring, and lifecycle management of security-related events are typically managed by the:
What is a key goal of information security?
With a focus on the review and approval aspects of board responsibilities, the Data Governance Council recommends that the boards provide strategic oversight regarding information and information security, include these four things:
A CISO must conduct risk assessments using a method where the Chief Financial Officer (CFO) receives impact data in financial terms to use as input to select the proper level of coverage in a new cybersecurity insurance policy.
What is the MOST effective method of risk analysis to provide the CFO with the information required?
In defining a strategic security plan for an organization, what should a CISO first analyze?
What is the primary difference between Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?
Which of the following is the MOST effective method to counter phishing attacks?
Which of the following are the triple constraints of project management?
When information security falls under the Chief Information Officer (CIO), what is their MOST essential role?
Which of the following is NOT an approach for ethical decision making?
As the Risk Manager of an organization, you are task with managing vendor risk assessments. During the assessment, you identified that the vendor is engaged with high profiled clients, and bad publicity can jeopardize your own brand.
Which is the BEST type of risk that defines this event?
A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:
Which of the following is considered the MOST effective tool against social engineering?
Providing oversight of an information security program for the organization is the primary responsibility of which group?
Which wireless encryption technology makes use of temporal keys?
While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?
SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?
Which of the following statements about Encapsulating Security Payload (ESP) is true?
The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?
Which of the following is a countermeasure to prevent unauthorized database access from web applications?
The process of identifying and classifying assets is typically included in the
Physical security measures typically include which of the following components?
What is the FIRST step in developing the vulnerability management program?
The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?
Which of the following is a symmetric encryption algorithm?
Which of the following backup sites takes the longest recovery time?
What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?
You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?
Your organization provides open guest wireless access with no captive portals. What can you do to assist with law enforcement investigations if one of your guests is suspected of committing an illegal act using your network?
Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?
Your incident handling manager detects a virus attack in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the incident handling process will utilize the signature to resolve this incident?
The process of creating a system which divides documents based on their security level to manage access to private data is known as
Security related breaches are assessed and contained through which of the following?
Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?
What type of attack requires the least amount of technical equipment and has the highest success rate?
A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?
An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?
Which of the following is the MAIN security concern for public cloud computing?
The process for identifying, collecting, and producing digital information in support of legal proceedings is called
One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks
2.Scanning and enumeration
3.Maintaining Access
4.Reconnaissance
5.Gaining Access
In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:
An anonymity network is a series of?
When gathering security requirements for an automated business process improvement program, which of the following is MOST important?
A system was hardened at the Operating System level and placed into the production environment. Months later an audit was performed and it identified insecure configuration different from the original hardened state. Which of the following security issues is the MOST likely reason leading to the audit findings?
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how hardware and software is implemented and managed within the organization. Which of the following principles does this best demonstrate?
Which of the following is considered one of the most frequent failures in project management?
Which of the following is a major benefit of applying risk levels?
Which of the following functions evaluates risk present in IT initiatives and/or systems when implementing an information security program?
Which of the following best summarizes the primary goal of a security program?
A stakeholder is a person or group:
A CISO sees abnormally high volumes of exceptions to security requirements and constant pressure from business units to change security processes. Which of the following represents the MOST LIKELY cause of this situation?
You manage a newly created Security Operations Center (SOC), your team is being inundated with security alerts and don’t know what to do. What is the BEST approach to handle this situation?
A severe security threat has been detected on your corporate network. As CISO you quickly assemble key members of the Information Technology team and business operations to determine a modification to security controls in response to the threat. This is an example of:
The ultimate goal of an IT security projects is:
Which business stakeholder is accountable for the integrity of a new information system?
This occurs when the quantity or quality of project deliverables is expanded from the original project plan.
When operating under severe budget constraints a CISO will have to be creative to maintain a strong security organization. Which example below is the MOST creative way to maintain a strong security posture during these difficult times?
Which of the following can the company implement in order to avoid this type of security issue in the future?
Acme Inc. has engaged a third party vendor to provide 99.999% up-time for their online web presence and had them contractually agree to this service level agreement. What type of risk tolerance is Acme exhibiting? (choose the BEST answer):
A recommended method to document the respective roles of groups and individuals for a given process is to:
Which of the following is the BEST indicator of a successful project?
Which one of the following BEST describes which member of the management team is accountable for the day-to-day operation of the information security program?
Which of the following represents the best method of ensuring business unit alignment with security program requirements?
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how hardware and software is implemented and managed within the organization. Which of the following principles does this best demonstrate?
A newly appointed security officer finds data leakage software licenses that had never been used. The officer decides to implement a project to ensure it gets installed, but the project gets a great deal of resistance across the organization. Which of the following represents the MOST likely reason for this situation?
A department within your company has proposed a third party vendor solution to address an urgent, critical business need. As the CISO you have been asked to accelerate screening of their security control claims. Which of the following vendor provided documents is BEST to make your decision:
In effort to save your company money which of the following methods of training results in the lowest cost for the organization?
Risk appetite is typically determined by which of the following organizational functions?
How often should the Statements of Standards for Attestation Engagements-16 (SSAE16)/International Standard on Assurance Engagements 3402 (ISAE3402) report of your vendors be reviewed?
Which of the following methods are used to define contractual obligations that force a vendor to meet customer expectations?
An organization has a stated requirement to block certain traffic on networks. The implementation of controls will disrupt a manufacturing process and cause unacceptable delays, resulting in sever revenue disruptions. Which of the following is MOST likely to be responsible for accepting the risk until mitigating controls can be implemented?
To get an Information Security project back on schedule, which of the following will provide the MOST help?
SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
In what phase of the response will the team extract information from the affected systems without altering original data?
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
After determining the audit findings are accurate, which of the following is the MOST logical next activity?
A CISO has implemented a risk management capability within the security portfolio. Which of the following
terms best describes this functionality?
Which of the following terms is used to describe countermeasures implemented to minimize risks to physical
property, information, and computing systems?
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
Which of the following is the FIRST action the CISO will perform after receiving the audit report?
What is meant by password aging?
Which of the following is the MOST important reason for performing assessments of the security portfolio?
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
Recently, members of your organization have been targeted through a number of sophisticated phishing attempts and have compromised their system credentials. What action can you take to prevent the misuse of compromised credentials to change bank account information from outside your organization while still allowing employees to manage their bank information?
The newly appointed CISO of an organization is reviewing the IT security strategic plan. Which of the following is the MOST important component of the strategic plan?
Simon had all his systems administrators implement hardware and software firewalls to ensure network
security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized
traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker
group was able to get into the network and modify files hosted on the company's website. After searching
through the firewall and server logs, no one could find how the attackers were able to get in. He decides that
the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts
administrators when a critical file is altered. What tool could Simon and his administrators implement to
accomplish this?
Scenario: You are the newly hired Chief Information Security Officer for a company that has not previously had a senior level security practitioner. The company lacks a defined security policy and framework for their Information Security Program. Your new boss, the Chief Financial Officer, has asked you to draft an outline of a security policy and recommend an industry/sector neutral information security control framework for implementation.
Your Corporate Information Security Policy should include which of the following?
Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements. During your investigation of the rumored compromise you discover that data has been breached and you have discovered the repository of stolen data on a server located in a foreign country. Your team now has full access to the data on the foreign server.
Your defenses did not hold up to the test as originally thought. As you investigate how the data was compromised through log analysis you discover that a hardworking, but misguided business intelligence analyst posted the data to an obfuscated URL on a popular cloud storage service so they could work on it from home during their off-time. Which technology or solution could you deploy to prevent employees from removing corporate data from your network? Choose the BEST answer.
The formal certification and accreditation process has four primary steps, what are they?
Involvement of senior management is MOST important in the development of:
Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.
From an Information Security Leadership perspective, which of the following is a MAJOR concern about the CISO’s approach to security?
Access Control lists (ACLs), Firewalls, and Intrusion Prevention Systems are examples of
During the last decade, what trend has caused the MOST serious issues in relation to physical security?
SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.
The CISO is unsure of the information provided and orders a vendor proof of concept to validate the system’s scalability. This demonstrates which of the following?
Annual Loss Expectancy is derived from the function of which two factors?
Which of the following is the MOST logical method of deploying security controls within an organization?
During the 3rd quarter of a budget cycle, the CISO noticed she spent more than was originally planned in her
annual budget. What is the condition of her current budgetary posture?
Michael starts a new job and discovers that he has unnecessary access to a variety of systems. Which of the
following best describes the problem he has encountered?
Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.
What is one proven method to account for common elements found within separate regulations and/or standards?
SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
What phase of the response provides measures to reduce the likelihood of an incident from recurring?
If the result of an NPV is positive, then the project should be selected. The net present value shows the present
value of the project, based on the decisions taken for its selection. What is the net present value equal to?
Scenario: Your company has many encrypted telecommunications links for their world-wide operations. Physically distributing symmetric keys to all locations has proven to be administratively burdensome, but symmetric keys are preferred to other alternatives.
How can you reduce the administrative burden of distributing symmetric keys for your employer?
What is the difference between encryption and tokenization?
The total cost of security controls should: