Spring Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

EC-Council Certified CISO (CCISO) Question and Answers

EC-Council Certified CISO (CCISO)

Last Update Feb 15, 2026
Total Questions : 494

We are offering FREE 712-50 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 712-50 free exam questions and then go for complete pool of EC-Council Certified CISO (CCISO) test questions that will help you more.

712-50 pdf

712-50 PDF

$36.75  $104.99
712-50 Engine

712-50 Testing Engine

$43.75  $124.99
712-50 PDF + Engine

712-50 PDF + Testing Engine

$57.75  $164.99
Questions 1

The success of the Chief Information Security Officer is MOST dependent upon:

Options:

A.  

favorable audit findings

B.  

following the recommendations of consultants and contractors

C.  

development of relationships with organization executives

D.  

raising awareness of security issues with end users

Discussion 0
Questions 2

A Security Operations Center (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen, and the database server was disconnected. Who must be informed of this incident?

Options:

A.  

Internal audit

B.  

All management staff

C.  

Government regulators

D.  

The data owner

Discussion 0
Questions 3

Which of the following functions evaluates risk present in IT initiatives and/or systems when implementing an information security program?

Options:

A.  

Risk Management

B.  

Risk Assessment

C.  

System Testing

D.  

Vulnerability Assessment

Discussion 0
Questions 4

After a risk assessment is performed, a particular risk is considered to have the potential of costing the organization 1.2 Million USD. This is an example of

Options:

A.  

Risk Tolerance

B.  

Qualitative risk analysis

C.  

Risk Appetite

D.  

Quantitative risk analysis

Discussion 0
Questions 5

Which of the following is a metric used for data backup and restoration metrics?

Options:

A.  

Mean Time to Operations (MTO)

B.  

Recovery Base Objective (RBO)

C.  

Maximum Tolerable Downtime (MTD)

D.  

Recovery Point Objective (RPO)

Discussion 0
Questions 6

Risk transference is BEST represented by which of the following actions?

Options:

A.  

Communicating the risk to all business units

B.  

Outsourcing data storage operations to a third party

C.  

Procuring cyber insurance

D.  

Changing current processes for data retention

Discussion 0
Questions 7

Which organizational structure blends elements of functional and project organizational models to create a hybrid reporting structure?

Options:

A.  

Distributed

B.  

Sole owner

C.  

Limited liability

D.  

Matrix

Discussion 0
Questions 8

Which is the BEST solution to monitor, measure, and report changes to critical data in a system?

Options:

A.  

Application logs

B.  

File integrity monitoring

C.  

SNMP traps

D.  

Syslog

Discussion 0
Questions 9

Which represents PROPER separation of duties in the corporate environment?

Options:

A.  

Information Security and Identity Access Management teams perform two distinct functions

B.  

Developers and Network teams both have admin rights on servers

C.  

Finance has access to Human Resources data

D.  

Information Security and Network teams perform two distinct functions

Discussion 0
Questions 10

Your company has limited resources to spend on security initiatives. The Chief Financial Officer asks you to prioritize the protection of information resources based on their value to the company. It is essential that you be able to communicate in language that your fellow executives will understand. You should:

Options:

A.  

Create timelines for mitigation

B.  

Develop a cost-benefit analysis

C.  

Calculate annual loss expectancy

D.  

Create a detailed technical executive summary

Discussion 0
Questions 11

What is the first thing that needs to be completed in order to create a security program for your organization?

Options:

A.  

Risk assessment

B.  

Security program budget

C.  

Business continuity plan

D.  

Compliance and regulatory analysis

Discussion 0
Questions 12

Which of the following is an IT governance framework that allows managers to bridge the gap between control requirements, technical issues, and business risks?

Options:

A.  

International Organization for Standardization (ISO) 27003

B.  

Control Objectives for Information and Related Technology (COBIT)

C.  

Payment Card Industry (PCI)

D.  

Health Insurance Portability and Accountability Act (HIPAA)

Discussion 0
Questions 13

When measuring the effectiveness of an Information Security Management System which one of the following would be MOST LIKELY used as a metric framework?

Options:

A.  

ISO 27001

B.  

PRINCE2

C.  

ISO 27004

D.  

ITILv3

Discussion 0
Questions 14

SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.

After determining the audit findings are accurate, which of the following is the MOST logical next activity?

Options:

A.  

Begin initial gap remediation analyses

B.  

Review the security organization’s charter

C.  

Validate gaps with the Information Technology team

D.  

Create a briefing of the findings for executive management

Discussion 0
Questions 15

An anonymity network is a series of?

Options:

A.  

Covert government networks

B.  

War driving maps

C.  

Government networks in Tora

D.  

Virtual network tunnels

Discussion 0
Questions 16

What is the THIRD state of the Tuckman Stages of Group Development?

Options:

A.  

Performing

B.  

Norming

C.  

Storming

D.  

Forming

Discussion 0
Questions 17

What framework of rules and practices is used by a Board of Directors to provide accountability, fairness, and transparency in the organization’s interactions with its shareholders?

Options:

A.  

Risk management

B.  

Stock performance

C.  

Corporate governance

D.  

Audit oversight

Discussion 0
Questions 18

Which of the following terms is defined as the friction or opposition resulting from actual or perceived differences or incompatibilities?

Options:

A.  

Agreement

B.  

Silos

C.  

Disgruntlement

D.  

Conflict

Discussion 0
Questions 19

Within an organization’s vulnerability management program, who has the responsibility to implement remediation actions?

Options:

A.  

Security officer

B.  

Data owner

C.  

Vulnerability engineer

D.  

System administrator

Discussion 0
Questions 20

Which of the following is NOT an approach for ethical decision making?

Options:

A.  

Common good

B.  

Utilitarian

C.  

Risk based

D.  

Fairness

Discussion 0
Questions 21

Acceptable levels of information security risk tolerance in an organization should be determined by?

Options:

A.  

Corporate legal counsel

B.  

CISO with reference to the company goals

C.  

CEO and board of director

D.  

Corporate compliance committee

Discussion 0
Questions 22

The remediation of a specific audit finding is deemed too expensive and will not be implemented. Which of the following is a TRUE statement?

Options:

A.  

The asset is more expensive than the remediation

B.  

The audit finding is incorrect

C.  

The asset being protected is less valuable than the remediation costs

D.  

The remediation costs are irrelevant; it must be implemented regardless of cost.

Discussion 0
Questions 23

What type of control is used when assigning information assurance requirements to an independent security group?

Options:

A.  

Detective

B.  

Organizational

C.  

Preemptive

D.  

Proactive

Discussion 0
Questions 24

The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?

Options:

A.  

Well established and defined digital forensics process

B.  

Establishing Enterprise-owned Botnets for preemptive attacks

C.  

Be able to retaliate under the framework of Active Defense

D.  

Collaboration with law enforcement

Discussion 0
Questions 25

Which of the following provides the BEST software risk remediation methods?

Options:

A.  

Software removal, define requirements, install updates

B.  

Discover software, deploy integrations, apply updates

C.  

Install patches and updates, adjust configurations, remove software

D.  

Install software replacements, remove data, maintain system

Discussion 0
Questions 26

Which of the following would negatively impact a log analysis of a multinational organization?

Options:

A.  

Centralized log management

B.  

Encrypted log files in transit

C.  

Each node set to local time

D.  

Log aggregation agent each node

Discussion 0
Questions 27

Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.

When adjusting the controls to mitigate the risks, how often should the CISO perform an audit to verify the controls?

Options:

A.  

Annually

B.  

Semi-annually

C.  

Quarterly

D.  

Never

Discussion 0
Questions 28

When should IT security project management be outsourced?

Options:

A.  

When organizational resources are limited

B.  

When the benefits of outsourcing outweigh the inherent risks of outsourcing

C.  

On new, enterprise-wide security initiatives

D.  

On projects not forecasted in the yearly budget

Discussion 0
Questions 29

An application vulnerability assessment has identified a security flaw in an application. This is a flaw that was previously identified and remediated on a prior release of the application. Which of the following is MOST likely the reason for this recurring issue?

Options:

A.  

Ineffective configuration management controls

B.  

Lack of change management controls

C.  

Lack of version/source controls

D.  

High turnover in the application development department

Discussion 0
Questions 30

An organization's Information Security Policy is of MOST importance because

Options:

A.  

it communicates management’s commitment to protecting information resources

B.  

it is formally acknowledged by all employees and vendors

C.  

it defines a process to meet compliance requirements

D.  

it establishes a framework to protect confidential information

Discussion 0
Questions 31

The network administrator wants to strengthen physical security in the organization. Specifically, to implement a

solution stopping people from entering certain restricted zones without proper credentials. Which of following

physical security measures should the administrator use?

Options:

A.  

Video surveillance

B.  

Mantrap

C.  

Bollards

D.  

Fence

Discussion 0
Questions 32

Which of the following should be determined while defining risk management strategies?

Options:

A.  

Organizational objectives and risk tolerance

B.  

Risk assessment criteria

C.  

IT architecture complexity

D.  

Enterprise disaster recovery plans

Discussion 0
Questions 33

SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.

What phase of the response provides measures to reduce the likelihood of an incident from recurring?

Options:

A.  

Response

B.  

Investigation

C.  

Recovery

D.  

Follow-up

Discussion 0
Questions 34

The alerting, monitoring and life-cycle management of security related events is typically handled by the

Options:

A.  

security threat and vulnerability management process

B.  

risk assessment process

C.  

risk management process

D.  

governance, risk, and compliance tools

Discussion 0
Questions 35

A new CISO just started with a company and on the CISO's desk is the last complete Information Security Management audit report. The audit report is over two years old. After reading it, what should be the CISO's FIRST priority?

Options:

A.  

Have internal audit conduct another audit to see what has changed.

B.  

Contract with an external audit company to conduct an unbiased audit

C.  

Review the recommendations and follow up to see if audit implemented the changes

D.  

Meet with audit team to determine a timeline for corrections

Discussion 0
Questions 36

Assigning the role and responsibility of Information Assurance to a dedicated and independent security group is an example of:

Options:

A.  

Detective Controls

B.  

Proactive Controls

C.  

Preemptive Controls

D.  

Organizational Controls

Discussion 0
Questions 37

The single most important consideration to make when developing your security program, policies, and processes is:

Options:

A.  

Budgeting for unforeseen data compromises

B.  

Streamlining for efficiency

C.  

Alignment with the business

D.  

Establishing your authority as the Security Executive

Discussion 0
Questions 38

The security team has investigated the theft/loss of several unencrypted laptop computers containing sensitive corporate information. To prevent the loss of any additional corporate data it is unilaterally decided by the CISO that all existing and future laptop computers will be encrypted. Soon, the help desk is flooded with complaints about the slow performance of the laptops and users are upset. What did the CISO do wrong? (choose the BEST answer):

Options:

A.  

Failed to identify all stakeholders and their needs

B.  

Deployed the encryption solution in an inadequate manner

C.  

Used 1024 bit encryption when 256 bit would have sufficed

D.  

Used hardware encryption instead of software encryption

Discussion 0
Questions 39

Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.

You have decided to deal with risk to information from people first. How can you minimize risk to your most sensitive information before granting access?

Options:

A.  

Conduct background checks on individuals before hiring them

B.  

Develop an Information Security Awareness program

C.  

Monitor employee browsing and surfing habits

D.  

Set your firewall permissions aggressively and monitor logs regularly.

Discussion 0
Questions 40

A recent audit has identified a few control exceptions and is recommending the implementation of technology and processes to address the finding. Which of the following is the MOST likely reason for the organization to reject the implementation of the recommended technology and processes?

Options:

A.  

The auditors have not followed proper auditing processes

B.  

The CIO of the organization disagrees with the finding

C.  

The risk tolerance of the organization permits this risk

D.  

The organization has purchased cyber insurance

Discussion 0
Questions 41

An organization correctly configured a Data Loss Prevention (DLP) technology. Afterward, sensitive data was found on public websites. What is the MOST likely reason for this situation?

Options:

A.  

A risk assessment was performed on the technology

B.  

The technology was not integrated with antivirus

C.  

Data classification was not properly applied

D.  

Sensitive data was not encrypted while at rest

Discussion 0
Questions 42

Which of the following tests is an IS auditor performing when a sample of programs is selected to determine if the source and object versions are the same?

Options:

A.  

A substantive test of program library controls

B.  

A compliance test of program library controls

C.  

A compliance test of the program compiler controls

D.  

A substantive test of the program compiler controls

Discussion 0
Questions 43

The PRIMARY objective for information security program development should be:

Options:

A.  

Reducing the impact of the risk to the business.

B.  

Establishing strategic alignment with bunsiness continuity requirements

C.  

Establishing incident response programs.

D.  

Identifying and implementing the best security solutions.

Discussion 0
Questions 44

Which regulation or policy governs protection of personally identifiable user data gathered during a cyber investigation?

Options:

A.  

ITIL

B.  

Privacy Act

C.  

Sarbanes Oxley

D.  

PCI-DSS

Discussion 0
Questions 45

Which of the following illustrates an operational control process:

Options:

A.  

Classifying an information system as part of a risk assessment

B.  

Installing an appropriate fire suppression system in the data center

C.  

Conducting an audit of the configuration management process

D.  

Establishing procurement standards for cloud vendors

Discussion 0
Questions 46

The amount of risk an organization is willing to accept in pursuit of its mission is known as

Options:

A.  

Risk mitigation

B.  

Risk transfer

C.  

Risk tolerance

D.  

Risk acceptance

Discussion 0
Questions 47

Which of the following represents the best method of ensuring business unit alignment with security program requirements?

Options:

A.  

Provide clear communication of security requirements throughout the organization

B.  

Demonstrate executive support with written mandates for security policy adherence

C.  

Create collaborative risk management approaches within the organization

D.  

Perform increased audits of security processes and procedures

Discussion 0
Questions 48

Which of the following represents the BEST method for obtaining business unit acceptance of security controls within an organization?

Options:

A.  

Allow the business units to decide which controls apply to their systems, such as the encryption of sensitive data

B.  

Create separate controls for the business units based on the types of business and functions they perform

C.  

Ensure business units are involved in the creation of controls and defining conditions under which they must be applied

D.  

Provide the business units with control mandates and schedules of audits for compliance validation

Discussion 0
Questions 49

Which of the following is a common technology for visual monitoring?

Options:

A.  

Closed circuit television

B.  

Open circuit television

C.  

Blocked video

D.  

Local video

Discussion 0
Questions 50

A recent audit has identified control exceptions and recommends implementing technology and processes to remediate the finding. Which of the following is the MOST likely reason for the organization to reject the recommendation?

Options:

A.  

The organization has focused only on regulatory issues

B.  

The auditors have not followed proper auditing processes

C.  

The business agrees with the finding

D.  

The situation is within the risk tolerance of the organization

Discussion 0
Questions 51

You have purchased a new insurance policy as part of your risk strategy. Which of the following risk strategy options have you engaged in?

Options:

A.  

Risk Avoidance

B.  

Risk Acceptance

C.  

Risk Transfer

D.  

Risk Mitigation

Discussion 0
Questions 52

What are the three stages of an identity and access management system?

Options:

A.  

Authentication, Authorize, Validation

B.  

Provision, Administration, Enforcement

C.  

Administration, Validation, Protect

D.  

Provision, Administration, Authentication

Discussion 0
Questions 53

You manage a newly created Security Operations Center (SOC), your team is being inundated with security alerts and don’t know what to do. What is the BEST approach to handle this situation?

Options:

A.  

Tell the team to do their best and respond to each alert

B.  

Tune the sensors to help reduce false positives so the team can react better

C.  

Request additional resources to handle the workload

D.  

Tell the team to only respond to the critical and high alerts

Discussion 0
Questions 54

What is the difference between encryption and tokenization?

Options:

A.  

Tokenization combined with hashing is always better than encryption

B.  

Encryption can be mathematically reversed to provide the original information

C.  

The token contains the all original information

D.  

Tokenization can be mathematically reversed to provide the original information

Discussion 0
Questions 55

Which of the following activities results in change requests?

Options:

A.  

Preventive actions

B.  

Inspection

C.  

Defect repair

D.  

Corrective actions

Discussion 0
Questions 56

In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:

Options:

A.  

Secure the area and shut-down the computer until investigators arrive

B.  

Secure the area and attempt to maintain power until investigators arrive

C.  

Immediately place hard drive and other components in an anti-static bag

D.  

Secure the area.

Discussion 0
Questions 57

Effective information security management programs require the active involvement of_________

Options:

A.  

ClOS

B.  

All employees

C.  

Security Managers

D.  

Executives

Discussion 0
Questions 58

A system is designed to dynamically block offending Internet IP-addresses from requesting services from a secure website. This type of control is considered

Options:

A.  

Zero-day attack mitigation

B.  

Preventive detection control

C.  

Corrective security control

D.  

Dynamic blocking control

Discussion 0
Questions 59

When selecting a security solution with reoccurring maintenance costs after the first year, the CISO should: (choose the BEST answer)

Options:

A.  

The CISO should cut other essential programs to ensure the new solution’s continued use

B.  

Communicate future operating costs to the CIO/CFO and seek commitment from them to ensure the new solution’s continued use

C.  

Defer selection until the market improves and cash flow is positive

D.  

Implement the solution and ask for the increased operating cost budget when it is time

Discussion 0
Questions 60

What is a key policy that should be part of the information security plan?

Options:

A.  

Account management policy

B.  

Training policy

C.  

Acceptable Use policy

D.  

Remote Access policy

Discussion 0
Questions 61

An organization has implemented a change management process for all changes to the IT production environment. This change management process follows best practices and is expected to help stabilize the availability and integrity of the organization’s IT environment. Which of the following can be used to measure the effectiveness of this newly implemented process:

Options:

A.  

Number of change orders rejected

B.  

Number and length of planned outages

C.  

Number of unplanned outages

D.  

Number of change orders processed

Discussion 0
Questions 62

The process of creating a system which divides documents based on their security level to manage access to private data is known as

Options:

A.  

security coding

B.  

data security system

C.  

data classification

D.  

privacy protection

Discussion 0
Questions 63

Which of the following is the MOST critical aspect of a security policy?

Options:

A.  

Clearly defined processes to meet compliance requirements

B.  

Formal acknowledgement by most employees and vendors

C.  

An established guideline to protect confidential information

D.  

Communication of management’s commitment to security

Discussion 0
Questions 64

SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.

The CISO is unsure of the information provided and orders a vendor proof of concept to validate the system’s scalability. This demonstrates which of the following?

Options:

A.  

An approach that allows for minimum budget impact if the solution is unsuitable

B.  

A methodology-based approach to ensure authentication mechanism functions

C.  

An approach providing minimum time impact to the implementation schedules

D.  

A risk-based approach to determine if the solution is suitable for investment

Discussion 0
Questions 65

What is defined as the friction or opposition resulting from actual or perceived differences or incompatibilities?

Options:

A.  

Disgruntlement

B.  

Silos

C.  

Conflict

D.  

Disagreement

Discussion 0
Questions 66

Your company has a “no right to privacy” notice on all logon screens for your information systems and users sign an Acceptable Use Policy informing them of this condition. A peer group member and friend comes to you and requests access to one of her employee’s email account. What should you do? (choose the BEST answer):

Options:

A.  

Grant her access, the employee has been adequately warned through the AUP.

B.  

Assist her with the request, but only after her supervisor signs off on the action.

C.  

Reset the employee’s password and give it to the supervisor.

D.  

Deny the request citing national privacy laws.

Discussion 0
Questions 67

An organization licenses and uses personal information for business operations, and a server containing that information has been compromised. What kind of law would require notifying the owner or licensee of this incident?

Options:

A.  

Data breach disclosure

B.  

Consumer right disclosure

C.  

Security incident disclosure

D.  

Special circumstance disclosure

Discussion 0
Questions 68

Which of the following is the MAIN security concern for public cloud computing?

Options:

A.  

Unable to control physical access to the servers

B.  

Unable to track log on activity

C.  

Unable to run anti-virus scans

D.  

Unable to patch systems as needed

Discussion 0
Questions 69

Creating a secondary authentication process for network access would be an example of?

Options:

A.  

An administrator with too much time on their hands.

B.  

Putting undue time commitment on the system administrator.

C.  

Supporting the concept of layered security

D.  

Network segmentation.

Discussion 0
Questions 70

During a cyber incident, which of the following non-security personnel will MOST likely be required to assist the incident response team?

Options:

A.  

Legal, help desk, system and network administrators

B.  

Threat analysts, IT auditors, security operations managers

C.  

Financial analysts, payroll clerks, HR managers

D.  

Human resources, facilities maintenance, and IT support

Discussion 0
Questions 71

Which of the following is the MOST important action of an Information Security Steering Committee?

Options:

A.  

Be briefed about new trends and products by a vendor

B.  

Ensure the committee includes members from different departments and employee levels

C.  

Ensure that security policies and procedures have been approved by the Board of Directors

D.  

Review of current audit and compliance reports

Discussion 0
Questions 72

Your incident response plan should include which of the following?

Options:

A.  

Procedures for litigation

B.  

Procedures for reclamation

C.  

Procedures for classification

D.  

Procedures for charge-back

Discussion 0
Questions 73

As the Risk Manager of an organization, you are task with managing vendor risk assessments. During the assessment, you identified that the vendor is engaged with high profiled clients, and bad publicity can jeopardize your own brand.

Which is the BEST type of risk that defines this event?

Options:

A.  

Compliance Risk

B.  

Reputation Risk

C.  

Operational Risk

D.  

Strategic Risk

Discussion 0
Questions 74

A consultant is hired to do physical penetration testing at a large financial company. In the first day of his

assessment, the consultant goes to the company’s building dressed like an electrician and waits in the lobby for

an employee to pass through the main access gate, then the consultant follows the employee behind to get into

the restricted area. Which type of attack did the consultant perform?

Options:

A.  

Shoulder surfing

B.  

Tailgating

C.  

Social engineering

D.  

Mantrap

Discussion 0
Questions 75

Which of the following is the MOST important reason to measure the effectiveness of an Information Security Management System (ISMS)?

Options:

A.  

Meet regulatory compliance requirements

B.  

Better understand the threats and vulnerabilities affecting the environment

C.  

Better understand strengths and weaknesses of the program

D.  

Meet legal requirements

Discussion 0
Questions 76

What is the last step in the system authorization process?

Options:

A.  

Connecting the systems to an Internet Service Provider (ISP) for verification

B.  

Getting authority to operate the system from executive management

C.  

Changing the default passwords within all affected systems

D.  

Conducting a final scan of the production system and mitigating all high-level vulnerabilities

Discussion 0
Questions 77

Controls that were implemented to correct prior audit findings are insufficient. Before adjusting controls, what original document should be reviewed?

Options:

A.  

Business recovery plan

B.  

Business Impact Analysis

C.  

Security process catalogue

D.  

Annual report to shareholders

Discussion 0
Questions 78

Who is responsible for oversight of an information security program within an organization?

Options:

A.  

Auditor

B.  

Senior leadership

C.  

General Counsel

D.  

Human Resources

Discussion 0
Questions 79

Control Objectives for Information and Related Technology (COBIT) is which of the following?

Options:

A.  

An Information Security audit standard

B.  

An audit guideline for certifying secure systems and controls

C.  

A framework for Information Technology management and governance

D.  

A set of international regulations for Information Technology governance

Discussion 0
Questions 80

What can you do to assist with law enforcement investigations if someone on your guest wireless network is suspected of committing an illegal act using your network?

Options:

A.  

Provide logging and analysis for all access points

B.  

Disable SSID broadcast and enable address filtering on access points

C.  

Install firewall software on all access points

D.  

Provide the IP address, MAC address, and other pertinent information

Discussion 0
Questions 81

Which of the following activities is the MAIN purpose of the risk assessment process?

Options:

A.  

Creating an inventory of information assets

B.  

Classifying and organizing information assets into meaningful groups

C.  

Assigning value to each information asset

D.  

Calculating the risks to which assets are exposed in their current setting

Discussion 0
Questions 82

You are evaluating an audit report and notice it only contains lists of findings and technical diagrams. What additional component should be integrated?

Options:

A.  

Prior audit reports

B.  

Business risk appetite statements

C.  

Audit team contact information

D.  

Executive summary

Discussion 0
Questions 83

Devising controls for information security is a balance between?

Options:

A.  

Governance and compliance

B.  

Auditing and security

C.  

Budget and risk tolerance

D.  

Threats and vulnerabilities

Discussion 0
Questions 84

If a Virtual Machine’s (VM) data is being replicated and that data is corrupted, this corruption will automatically

be replicated to the other machine(s). What would be the BEST control to safeguard data integrity?

Options:

A.  

Backup to tape

B.  

Maintain separate VM backups

C.  

Backup to a remote location

D.  

Increase VM replication frequency

Discussion 0
Questions 85

What enterprise architecture framework is business-centric and composed of eight phases?

Options:

A.  

Global Regulations Security Architecture

B.  

The Open Group Architecture Framework (TOGAF)

C.  

Federated Enterprise Architecture

D.  

Control Objectives for Information Technology (COBIT)

Discussion 0
Questions 86

Which of the following terms is used to describe the unexpected expansion of project deliverables?

Options:

A.  

Vendor management

B.  

Scope compression

C.  

Scope creep

D.  

Results management

Discussion 0
Questions 87

In MOST organizations which group periodically reviews network intrusion detection system logs for all systems as part of their daily tasks?

Options:

A.  

Internal Audit

B.  

Database Administration

C.  

Information Security

D.  

Compliance

Discussion 0
Questions 88

A cloud computing environment that is bound together by technology that allows data and applications to be shared between public and private clouds is BEST referred to as a?

Options:

A.  

Public cloud

B.  

Private cloud

C.  

Community cloud

D.  

Hybrid cloud

Discussion 0
Questions 89

Which of the following is considered to be an IT governance framework and a supporting toolset that allows for managers to bridge the gap between control requirements, technical issues, and business risks?

Options:

A.  

Control Objective for Information Technology (COBIT)

B.  

Committee of Sponsoring Organizations (COSO)

C.  

Payment Card Industry (PCI)

D.  

Information Technology Infrastructure Library (ITIL)

Discussion 0
Questions 90

What does the information security program primarily protect?

Options:

A.  

All organizational assets as identified by the Chief Information Officer

B.  

Audit schedules, reports, and remediations

C.  

Critical data, systems, and processes

D.  

Intellectual property and trademarks used by the business

Discussion 0
Questions 91

The PRIMARY objective of security awareness is to:

Options:

A.  

Ensure that security policies are read.

B.  

Encourage security-conscious employee behavior.

C.  

Meet legal and regulatory requirements.

D.  

Put employees on notice in case follow-up action for noncompliance is necessary

Discussion 0
Questions 92

Which wireless encryption technology makes use of temporal keys?

Options:

A.  

Wireless Application Protocol (WAP)

B.  

Wifi Protected Access version 2 (WPA2)

C.  

Wireless Equivalence Protocol (WEP)

D.  

Extensible Authentication Protocol (EAP)

Discussion 0
Questions 93

A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should the information security manager take?

Options:

A.  

Enforce the existing security standards and do not allow the deployment of the new technology.

B.  

Amend the standard to permit the deployment.

C.  

If the risks associated with that technology are not already identified, perform a risk analysis to quantify the risk, and allow the business unit to proceed based on the identified risk level.

D.  

Permit a 90-day window to see if an issue occurs and then amend the standard if there are no issues.

Discussion 0
Questions 94

Risk that remains after risk mitigation is known as

Options:

A.  

Persistent risk

B.  

Residual risk

C.  

Accepted risk

D.  

Non-tolerated risk

Discussion 0
Questions 95

When analyzing and forecasting an operating expense budget what are not included?

Options:

A.  

Software and hardware license fees

B.  

Utilities and power costs

C.  

Network connectivity costs

D.  

New datacenter to operate from

Discussion 0
Questions 96

At which point should the identity access management team be notified of the termination of an employee?

Options:

A.  

At the end of the day once the employee is off site

B.  

During the monthly review cycle

C.  

Immediately so the employee account(s) can be disabled

D.  

Before an audit

Discussion 0
Questions 97

Michael starts a new job and discovers that he has unnecessary access to a variety of systems. Which of the

following best describes the problem he has encountered?

Options:

A.  

Rights collision

B.  

Excessive privileges

C.  

Privilege creep

D.  

Least privileges

Discussion 0
Questions 98

Which of the following is the MAIN reason to follow a formal risk management process in an organization that hosts and uses privately identifiable information (PII) as part of their business models and processes?

Options:

A.  

Need to comply with breach disclosure laws

B.  

Need to transfer the risk associated with hosting PII data

C.  

Need to better understand the risk associated with using PII data

D.  

Fiduciary responsibility to safeguard credit card information

Discussion 0
Questions 99

What is the BEST way to achieve on-going compliance monitoring in an organization?

Options:

A.  

Only check compliance right before the auditors are scheduled to arrive onsite.

B.  

Outsource compliance to a 3rd party vendor and let them manage the program.

C.  

Have Compliance and Information Security partner to correct issues as they arise.

D.  

Have Compliance direct Information Security to fix issues after the auditors report.

Discussion 0
Questions 100

When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?

Options:

A.  

Vendors uses their own laptop and logins with same admin credentials your security team uses

B.  

Vendor uses a company supplied laptop and logins using two factor authentication with same admin credentials your security team uses

C.  

Vendor uses a company supplied laptop and logins using two factor authentication with their own unique credentials

D.  

Vendor uses their own laptop and logins using two factor authentication with their own unique credentials

Discussion 0
Questions 101

When you develop your audit remediation plan what is the MOST important criteria?

Options:

A.  

To remediate half of the findings before the next audit.

B.  

To remediate all of the findings before the next audit.

C.  

To validate that the cost of the remediation is less than the risk of the finding.

D.  

To validate the remediation process with the auditor.

Discussion 0
Questions 102

You have implemented a new security control. Which of the following risk strategy options have you engaged in?

Options:

A.  

Risk Avoidance

B.  

Risk Acceptance

C.  

Risk Transfer

D.  

Risk Mitigation

Discussion 0
Questions 103

An IT auditor has recently discovered that because of a shortage of skilled operations personnel, the security administrator has agreed to work one late night shift a week as the senior computer operator. The most appropriate course of action for the IT auditor is to:

Options:

A.  

Inform senior management of the risk involved.

B.  

Agree to work with the security officer on these shifts as a form of preventative control.

C.  

Develop a computer assisted audit technique to detect instances of abuses of the arrangement.

D.  

Review the system log for each of the late night shifts to determine whether any irregular actions occurred.

Discussion 0
Questions 104

When gathering security requirements for an automated business process improvement program, which of the following is MOST important?

Options:

A.  

type of computer the data s processed on

B.  

Type of data contained in the process and system

C.  

Type of connection and protocol used to transfer the data

D.  

Type of encryption required for the data once it is at rest

Discussion 0
Questions 105

Which of the following methodologies references the recommended industry standard that Information security project managers should follow?

Options:

A.  

The Security Systems Development Life Cycle

B.  

The Security Project And Management Methodology

C.  

Project Management System Methodology

D.  

Project Management Body of Knowledge

Discussion 0
Questions 106

The newly appointed CISO of an organization is reviewing the IT security strategic plan. Which of the following is the MOST important component of the strategic plan?

Options:

A.  

There is integration between IT security and business staffing.

B.  

There is a clear definition of the IT security mission and vision.

C.  

There is an auditing methodology in place.

D.  

The plan requires return on investment for all security projects.

Discussion 0
Questions 107

Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?

Options:

A.  

Risk Assessment

B.  

Incident Response

C.  

Risk Management

D.  

Network Security administration

Discussion 0
Questions 108

The primary purpose of a risk register is to:

Options:

A.  

Maintain a log of discovered risks

B.  

Track individual risk assessments

C.  

Develop plans for mitigating identified risks

D.  

Coordinate the timing of scheduled risk assessments

Discussion 0
Questions 109

An organization has decided to develop an in-house BCM capability. The organization has determined it is best to follow a BCM standard published by the International Organization for Standardization (ISO).

The BEST ISO standard to follow that outlines the complete lifecycle of BCM is?

Options:

A.  

ISO 22318 Supply Chain Continuity

B.  

ISO 27031 BCM Readiness

C.  

ISO 22301 BCM Requirements

D.  

ISO 22317 BIA

Discussion 0
Questions 110

An organization has defined a set of standard security controls. This organization has also defined the circumstances and conditions in which they must be applied. What is the NEXT logical step in applying the controls in the organization?

Options:

A.  

Determine the risk tolerance

B.  

Perform an asset classification

C.  

Create an architecture gap analysis

D.  

Analyze existing controls on systems

Discussion 0
Questions 111

Which of the following is an accurate description of a balance sheet?

Options:

A.  

The percentage of earnings that are retained by the organization for reinvestment in the business

B.  

The details of expenses and revenue over a long period of time

C.  

A summarized statement of all assets and liabilities at a specific point in time

D.  

A review of regulations and requirements impacting the business from a financial perspective

Discussion 0
Questions 112

Human resource planning for security professionals in your organization is a:

Options:

A.  

Simple and easy task because the threats are getting easier to find and correct.

B.  

Training requirement that is met through once every year user training.

C.  

Training requirement that is on-going and always changing.

D.  

Not needed because automation and anti-virus software has eliminated the threats.

Discussion 0
Questions 113

Which of the following areas are beyond the duties of the CISO?

Options:

A.  

IT security compliance

B.  

lnformation Technology (IT) portfolio management

C.  

Network monitoring

D.  

Cybersecurity policy

Discussion 0
Questions 114

Which of the following is the MOST important benefit of an effective security governance process?

Options:

A.  

Reduction of liability and overall risk to the organization

B.  

Better vendor management

C.  

Reduction of security breaches

D.  

Senior management participation in the incident response process

Discussion 0
Questions 115

When an organization claims it is secure because it is PCI-DSS certified, what is a good first question to ask towards assessing the effectiveness of their security program?

Options:

A.  

How many credit card records are stored?

B.  

How many servers do you have?

C.  

What is the scope of the certification?

D.  

What is the value of the assets at risk?

Discussion 0
Questions 116

Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.

Once supervisors and data owners have approved requests, information system administrators will implement

Options:

A.  

Technical control(s)

B.  

Management control(s)

C.  

Policy control(s)

D.  

Operational control(s)

Discussion 0
Questions 117

Which of the following is considered a project versus a managed process?

Options:

A.  

monitoring external and internal environment during incident response

B.  

ongoing risk assessments of routine operations

C.  

continuous vulnerability assessment and vulnerability repair

D.  

installation of a new firewall system

Discussion 0
Questions 118

When dealing with a risk management process, asset classification is important because it will impact the overall:

Options:

A.  

Threat identification

B.  

Risk monitoring

C.  

Risk treatment

D.  

Risk tolerance

Discussion 0
Questions 119

Which of the following is the MOST important for a CISO to understand when identifying threats?

Options:

A.  

How vulnerabilities can potentially be exploited in systems that impact the organization

B.  

How the security operations team will behave to reported incidents

C.  

How the firewall and other security devices are configured to prevent attacks

D.  

How the incident management team prepares to handle an attack

Discussion 0
Questions 120

The mean time to patch, number of virus outbreaks prevented, and number of vulnerabilities mitigated are examples of what type of performance metrics?

Options:

A.  

Risk metrics

B.  

Management metrics

C.  

Operational metrics

D.  

Compliance metrics

Discussion 0
Questions 121

Ensuring that the actions of a set of people, applications and systems follow the organization’s rules is BEST described as:

Options:

A.  

Risk management

B.  

Security management

C.  

Mitigation management

D.  

Compliance management

Discussion 0
Questions 122

Which of the following organizations is typically in charge of validating the implementation and effectiveness of security controls?

Options:

A.  

Security Administrators

B.  

Internal/External Audit

C.  

Risk Management

D.  

Security Operations

Discussion 0
Questions 123

Which of the following are the triple constraints of project management?

Options:

A.  

Time, quality, and scope

B.  

Cost, quality, and time

C.  

Scope, time, and cost

D.  

Quality, scope, and cost

Discussion 0
Questions 124

What is the MOST likely detrimental consequence arising from an ineffective security governance program within a highly regulated organization?

Options:

A.  

Delayed response to security incidents

B.  

Increased regulatory personnel allocation for security oversight

C.  

Penalties incurred due to regulatory violations

D.  

Increased employee morale and satisfaction

Discussion 0
Questions 125

Physical security measures typically include which of the following components?

Options:

A.  

Physical, Technical, Operational

B.  

Technical, Strong Password, Operational

C.  

Operational, Biometric, Physical

D.  

Strong password, Biometric, Common Access Card

Discussion 0
Questions 126

What function in an organization is responsible for collecting and communicating processes to facilitate the recovery of critical functions within an organization?

Options:

A.  

Business Continuity

B.  

Disaster Recovery

C.  

Security Operations

D.  

Legal Advisement

Discussion 0
Questions 127

You currently cannot provide for 24/7 coverage of your security monitoring and incident response duties and your company is resistant to the idea of adding more full-time employees to the payroll. Which combination of solutions would help to provide the coverage needed without the addition of more dedicated staff? (choose the best answer):

Options:

A.  

Deploy a SEIM solution and have current staff review incidents first thing in the morning

B.  

Contract with a managed security provider and have current staff on recall for incident response

C.  

Configure your syslog to send SMS messages to current staff when target events are triggered

D.  

Employ an assumption of breach protocol and defend only essential information resources

Discussion 0
Questions 128

According to the National Institute of Standards and Technology (NIST) SP 800-40, which of the following considerations are MOST important when creating a vulnerability management program?

Options:

A.  

Susceptibility to attack, mitigation response time, and cost

B.  

Attack vectors, controls cost, and investigation staffing needs

C.  

Vulnerability exploitation, attack recovery, and mean time to repair

D.  

Susceptibility to attack, expected duration of attack, and mitigation availability

Discussion 0
Questions 129

IT control objectives are useful to IT auditors as they provide the basis for understanding the:

Options:

A.  

Desired results or purpose of implementing specific control procedures.

B.  

The audit control checklist.

C.  

Techniques for securing information.

D.  

Security policy

Discussion 0
Questions 130

Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.

An effective way to evaluate the effectiveness of an information security awareness program for end users, especially senior executives, is to conduct periodic:

Options:

A.  

Controlled spear phishing campaigns

B.  

Password changes

C.  

Baselining of computer systems

D.  

Scanning for viruses

Discussion 0
Questions 131

Scenario: Your company has many encrypted telecommunications links for their world-wide operations. Physically distributing symmetric keys to all locations has proven to be administratively burdensome, but symmetric keys are preferred to other alternatives.

How can you reduce the administrative burden of distributing symmetric keys for your employer?

Options:

A.  

Use asymmetric encryption for the automated distribution of the symmetric key

B.  

Use a self-generated key on both ends to eliminate the need for distribution

C.  

Use certificate authority to distribute private keys

D.  

Symmetrically encrypt the key and then use asymmetric encryption to unencrypt it

Discussion 0
Questions 132

Which of the following are not stakeholders of IT security projects?

Options:

A.  

Board of directors

B.  

Third party vendors

C.  

CISO

D.  

Help Desk

Discussion 0
Questions 133

One of the MAIN goals of a Business Continuity Plan is to

Options:

A.  

Ensure all infrastructure and applications are available in the event of a disaster

B.  

Allow all technical first-responders to understand their roles in the event of a disaster

C.  

Provide step by step plans to recover business processes in the event of a disaster

D.  

Assign responsibilities to the technical teams responsible for the recovery of all data.

Discussion 0
Questions 134

What is a key goal of information security?

Options:

A.  

Creation of controls and processes to security the organization's data and information resources

B.  

The documentation and qualification of risk be the organization to facilitate better decision making by management

C.  

The confidentiality, integrity, and availability of the organization s data and information resources

D.  

to reduce adverse impacts on the organization to an acceptable level of risk

Discussion 0
Questions 135

What type of attack requires the least amount of technical equipment and has the highest success rate?

Options:

A.  

War driving

B.  

Operating system attacks

C.  

Social engineering

D.  

Shrink wrap attack

Discussion 0
Questions 136

Which of the following results would have the MOST significant negative effect on an organization's external market image?

Options:

A.  

Negative internal audit findings regarding security controls performance

B.  

Regulatory non-compliance resulting in fines and legal proceedings

C.  

Unmanaged security awareness guidelines

D.  

Increased security budgets due to discovered threats and vulnerabilities

Discussion 0
Questions 137

What is the MOST important reason to have senior leadership endorse security policies?

Options:

A.  

Auditors will recognize the organization’s commitment to security

B.  

So they will accept ownership for security within the organization

C.  

So that they can be held legally accountable when a severe incident occurs

D.  

To force employees to adhere to security policies

Discussion 0
Questions 138

Smith, the project manager for a larger multi-location firm, is leading a software project team that has 18

members, 5 of which are assigned to testing. Due to recent recommendations by an organizational quality audit

team, the project manager is convinced to add a quality professional to lead to test team at additional cost to

the project.

The project manager is aware of the importance of communication for the success of the project and takes the

step of introducing additional communication channels, making it more complex, in order to assure quality

levels of the project. What will be the first project management document that Smith should change in order to

accommodate additional communication channels?

Options:

A.  

WBS document

B.  

Scope statement

C.  

Change control document

D.  

Risk management plan

Discussion 0
Questions 139

An organization has a number of Local Area Networks (LANs) linked to form a single Wide Area Network

(WAN). Which of the following would BEST ensure network continuity?

Options:

A.  

Third-party emergency repair contract

B.  

Pre-built servers and routers

C.  

Permanent alternative routing

D.  

Full off-site backup of every server

Discussion 0
Questions 140

According to ISO 27001, of the steps for establishing an Information Security Governance program listed below, which comes first?

Options:

A.  

Identify threats, risks, impacts and vulnerabilities

B.  

Decide how to manage risk

C.  

Define the budget of the Information Security Management System

D.  

Define Information Security Policy

Discussion 0
Questions 141

John is the project manager for a large project in his organization. A new change request has been proposed that will affect several areas of the project. One area of the project change impact is on work that a vendor has already completed. The vendor is refusing to make the changes as they’ve already completed the project work they were contracted to do. What can John do in this instance?

Options:

A.  

Refer the vendor to the Service Level Agreement (SLA) and insist that they make the changes.

B.  

Review the Request for Proposal (RFP) for guidance.

C.  

Withhold the vendor’s payments until the issue is resolved.

D.  

Refer to the contract agreement for direction.

Discussion 0
Questions 142

What is the primary reason for performing a return on investment analysis?

Options:

A.  

To decide between multiple vendors

B.  

To decide is the solution costs less than the risk it is mitigating

C.  

To determine the current present value of a project

D.  

To determine the annual rate of loss

Discussion 0
Questions 143

Which of the following BEST mitigates ransomware threats?

Options:

A.  

Phishing exercises

B.  

Use immutable data storage

C.  

Blocking use of wireless networks

D.  

Application of multiple endpoint anti-malware solutions

Discussion 0
Questions 144

If your organization operates under a model of "assumption of breach", you should:

Options:

A.  

Protect all information resource assets equally

B.  

Establish active firewall monitoring protocols

C.  

Purchase insurance for your compliance liability

D.  

Focus your security efforts on high value assets

Discussion 0
Questions 145

When a critical vulnerability has been discovered on production systems and needs to be fixed immediately, what is the BEST approach for a CISO to mitigate the vulnerability under tight budget constraints?

Options:

A.  

Transfer financial resources from other critical programs

B.  

Take the system off line until the budget is available

C.  

Deploy countermeasures and compensating controls until the budget is available

D.  

Schedule an emergency meeting and request the funding to fix the issue

Discussion 0
Questions 146

Which of the following provides an audit framework?

Options:

A.  

Control Objectives for IT (COBIT)

B.  

Payment Card Industry-Data Security Standard (PCI-DSS)

C.  

International Organization Standard (ISO) 27002

D.  

National Institute of Standards and Technology (NIST) SP 800-30

Discussion 0
Questions 147

You have implemented the new controls. What is the next step?

Options:

A.  

Document the process for the stakeholders

B.  

Monitor the effectiveness of the controls

C.  

Update the audit findings report

D.  

Perform a risk assessment

Discussion 0
Questions 148

Credit card information, medical data, and government records are all examples of:

Options:

A.  

Confidential/Protected Information

B.  

Bodily Information

C.  

Territorial Information

D.  

Communications Information

Discussion 0
Questions 149

From the CISO’s perspective in looking at financial statements, the statement of retained earnings of an organization:

Options:

A.  

Has a direct correlation with the CISO’s budget

B.  

Represents, in part, the savings generated by the proper acquisition and implementation of security controls

C.  

Represents the sum of all capital expenditures

D.  

Represents the percentage of earnings that could in part be used to finance future security controls

Discussion 0
Questions 150

A security manager regualrly checks work areas after buisness hours for security violations; such as unsecured files or unattended computers with active sessions. This activity BEST demonstrates what part of a security program?

Options:

A.  

Audit validation

B.  

Physical control testing

C.  

Compliance management

D.  

Security awareness training

Discussion 0
Questions 151

Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?

Options:

A.  

Comprehensive Log-Files from all servers and network devices affected during the attack

B.  

Fully trained network forensic experts to analyze all data right after the attack

C.  

Uninterrupted Chain of Custody

D.  

Expert forensics witness

Discussion 0
Questions 152

A method to transfer risk is to:

Options:

A.  

Implement redundancy

B.  

move operations to another region

C.  

purchase breach insurance

D.  

Alignment with business operations

Discussion 0
Questions 153

As the new CISO at the company you are reviewing the audit reporting process and notice that it includes only detailed technical diagrams. What else should be in the reporting process?

Options:

A.  

Executive summary

B.  

Penetration test agreement

C.  

Names and phone numbers of those who conducted the audit

D.  

Business charter

Discussion 0
Questions 154

As the CISO you need to write the IT security strategic plan. Which of the following is the MOST important to review before you start writing the plan?

Options:

A.  

The existing IT environment.

B.  

The company business plan.

C.  

The present IT budget.

D.  

Other corporate technology trends.

Discussion 0
Questions 155

Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.

This global retail company is expected to accept credit card payments. Which of the following is of MOST concern when defining a security program for this organization?

Options:

A.  

International encryption restrictions

B.  

Compliance to Payment Card Industry (PCI) data security standards

C.  

Compliance with local government privacy laws

D.  

Adherence to local data breach notification laws

Discussion 0
Questions 156

A Security Operations Centre (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen and the database server was disconnected. Who must be informed of this incident?

Options:

A.  

Internal audit

B.  

The data owner

C.  

All executive staff

D.  

Government regulators

Discussion 0
Questions 157

Which of the following is the MOST critical to review before you create a security strategy?

Options:

A.  

Security industry technology trends

B.  

The prior year security budget

C.  

Existing technology diagrams

D.  

The company business plan

Discussion 0
Questions 158

What cloud computing environment allows access and use by several organizations for information sharing?

Options:

A.  

Community cloud

B.  

Public cloud

C.  

Private cloud

D.  

Hybrid cloud

Discussion 0
Questions 159

In order to improve situational awareness, there is a need to deploy technology that can give a real-time view of security events across the enterprise. Which of the following tools represents the BEST choice to achieve this awareness?

Options:

A.  

Security Information and Event Management (SIEM), Intrusion Prevention Systems (IPS), routers, and server alerts

B.  

Intrusion Detection Systems (IDS), firewalls, switches, and system compliance tools

C.  

Virtualized servers, routers, firewalls, and system logs

D.  

Security Information and Event Management (SIEM), Intrusion Detection Systems (IDS), firewalls, and Vulnerability Management Systems (VMS)

Discussion 0
Questions 160

What two methods are used to assess risk impact?

Options:

A.  

Cost and annual rate of expectance

B.  

Subjective and Objective

C.  

Qualitative and percent of loss realized

D.  

Quantitative and qualitative

Discussion 0
Questions 161

A global retail company is creating a new compliance management process. Which of the following regulations is of MOST importance to be tracked and managed by this process?

Options:

A.  

Information Technology Infrastructure Library (ITIL)

B.  

International Organization for Standardization (ISO) standards

C.  

Payment Card Industry Data Security Standards (PCI-DSS)

D.  

National Institute for Standards and Technology (NIST) standard

Discussion 0
Questions 162

When analyzing and forecasting a capital expense budget what are not included?

Options:

A.  

Network connectivity costs

B.  

New datacenter to operate from

C.  

Upgrade of mainframe

D.  

Purchase of new mobile devices to improve operations

Discussion 0
Questions 163

Providing oversight of an information security program for the organization is the primary responsibility of which group?

Options:

A.  

Office of the Auditor

B.  

Senior Executives

C.  

Office of the General Counsel

D.  

All employees and users

Discussion 0
Questions 164

Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.

When multiple regulations or standards apply to your industry you should set controls to meet the:

Options:

A.  

Easiest regulation or standard to implement

B.  

Stricter regulation or standard

C.  

Most complex standard to implement

D.  

Recommendations of your Legal Staff

Discussion 0
Questions 165

A Security Operations (SecOps) Manager is considering implementing threat hunting to be able to make better decisions on protecting information and assets.

What is the MAIN goal of threat hunting to the SecOps Manager?

Options:

A.  

Improve discovery of valid detected events

B.  

Enhance tuning of automated tools to detect and prevent attacks

C.  

Replace existing threat detection strategies

D.  

Validate patterns of behavior related to an attack

Discussion 0
Questions 166

How often should the SSAE16 report of your vendors be reviewed?

Options:

A.  

Quarterly

B.  

Semi-annually

C.  

Annually

D.  

Bi-annually

Discussion 0
Questions 167

Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?

Options:

A.  

In-line hardware keyloggers don’t require physical access

B.  

In-line hardware keyloggers don’t comply to industry regulations

C.  

In-line hardware keyloggers are undetectable by software

D.  

In-line hardware keyloggers are relatively inexpensive

Discussion 0
Questions 168

During a cyber incident, which non-security personnel might be needed to assist the security team?

Options:

A.  

Threat analyst, IT auditor, forensic analyst

B.  

Network engineer, help desk technician, system administrator

C.  

CIO, CFO, CSO

D.  

Financial analyst, payroll clerk, HR manager

Discussion 0
Questions 169

What type of document defines the strategy, approach, and expectations within an organization?

Options:

A.  

Procedure

B.  

Standard

C.  

Guideline

D.  

Policy

Discussion 0
Questions 170

Which of the following is a countermeasure to prevent unauthorized database access from web applications?

Options:

A.  

Session encryption

B.  

Removing all stored procedures

C.  

Input sanitization

D.  

Library control

Discussion 0
Questions 171

In accordance with best practices and international standards, how often is security awareness training provided to employees of an organization?

Options:

A.  

High risk environments 6 months, low risk environments 12 months

B.  

Every 12 months

C.  

Every 18 months

D.  

Every six months

Discussion 0
Questions 172

What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?

Options:

A.  

Determine appetite

B.  

Evaluate risk avoidance criteria

C.  

Perform a risk assessment

D.  

Mitigate risk

Discussion 0
Questions 173

An organization’s firewall technology needs replaced. A specific technology has been selected that is less costly than others and lacking in some important capabilities. The security officer has voiced concerns about sensitive data breaches but the decision is made to purchase. What does this selection indicate?

Options:

A.  

A high threat environment

B.  

A low risk tolerance environment

C.  

I low vulnerability environment

D.  

A high risk tolerance environment

Discussion 0
Questions 174

Which of the following backup sites takes the longest recovery time?

Options:

A.  

Cold site

B.  

Hot site

C.  

Warm site

D.  

Mobile backup site

Discussion 0
Questions 175

Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.

Which of the following frameworks and standards will BEST fit the organization as a baseline for their security program?

Options:

A.  

NIST and Privacy Regulations

B.  

ISO 27000 and Payment Card Industry Data Security Standards

C.  

NIST and data breach notification laws

D.  

ISO 27000 and Human resources best practices

Discussion 0
Questions 176

Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY covered by which of the following plans?

Options:

A.  

Incident response plan

B.  

Business Continuity plan

C.  

Disaster recovery plan

D.  

Damage control plan

Discussion 0
Questions 177

When creating a vulnerability scan schedule, who is the MOST critical person to communicate with in order to ensure impact of the scan is minimized?

Options:

A.  

The asset owner

B.  

The asset manager

C.  

The data custodian

D.  

The project manager

Discussion 0
Questions 178

A security officer wants to implement a vulnerability scanning program. The officer is uncertain of the state of vulnerability resiliency within the organization’s large IT infrastructure. What would be the BEST approach to minimize scan data output while retaining a realistic view of system vulnerability?

Options:

A.  

Scan a representative sample of systems

B.  

Perform the scans only during off-business hours

C.  

Decrease the vulnerabilities within the scan tool settings

D.  

Filter the scan output so only pertinent data is analyzed

Discussion 0
Questions 179

When developing the Business Impact Assessment (BIA), which of the following MOST closely relates to data backup and restoration?

Options:

A.  

Maximum Tolerable Downtime (MTD)

B.  

Recovery Point Objective (RPO)

C.  

Mean Time to Del very >MTD)

D.  

Recovery Time Objective (RTO)

Discussion 0
Questions 180

The new CISO was informed of all the Information Security projects that the organization has in progress. Two projects are over a year behind schedule and over budget. Using best business practices for project management you determine that the project correctly aligns with the company goals.

Which of the following needs to be performed NEXT?

Options:

A.  

Verify the scope of the project

B.  

Verify the regulatory requirements

C.  

Verify technical resources

D.  

Verify capacity constraints

Discussion 0
Questions 181

The process for management approval of the security certification process which states the risks and mitigation of such risks of a given IT system is called

Options:

A.  

Security certification

B.  

Security system analysis

C.  

Security accreditation

D.  

Alignment with business practices and goals.

Discussion 0
Questions 182

Who is PRIMARILY responsible for declaring a disaster and initiating processes to facilitate the recovery of critical assets in an organization?

Options:

A.  

Business Continuity Manager

B.  

Board of Directors

C.  

Chief Executive Officer (CEO)

D.  

CISO

Discussion 0
Questions 183

What is the primary difference between Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?

Options:

A.  

Only IDS is susceptible to false positives

B.  

An IPS examines network traffic flows to detect and actively stop exploits and attacks

C.  

IPS identify potentially malicious traffic based on signature or behavior and IDS does not

D.  

IDS are typically deployed behind the firewall and IPS are deployed in front of the firewall

Discussion 0
Questions 184

Of the following, what is the MOST significant factor to consider when an organization retains sensitive customer data and leverages it to enhance the marketing of the organization’s products and services?

Options:

A.  

Market competition requirements

B.  

International personnel management laws

C.  

Compliance with privacy regulations

D.  

Product development speed

Discussion 0
Questions 185

What is an approach to estimating the strengths and weaknesses of alternatives used to determine options, which provide the BEST approach to achieving benefits while preserving savings called?

Options:

A.  

Business Impact Analysis

B.  

Economic Impact analysis

C.  

Return on Investment

D.  

Cost-benefit analysis

Discussion 0
Questions 186

Which of the following reports should you as an IT auditor use to check on compliance with a service level agreement’s requirement for uptime?

Options:

A.  

Systems logs

B.  

Hardware error reports

C.  

Utilization reports

D.  

Availability reports

Discussion 0
Questions 187

The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?

Options:

A.  

The need to change accounting periods on a regular basis.

B.  

The requirement to post entries for a closed accounting period.

C.  

The need to create and modify the chart of accounts and its allocations.

D.  

The lack of policies and procedures for the proper segregation of duties.

Discussion 0
Questions 188

Which of the following is MOST effective when mitigating social engineering risks?

Options:

A.  

Threat and Vulnerability Management Programs

B.  

Phishing tests

C.  

Anti-malware tools

D.  

Security awareness programs

Discussion 0
Questions 189

Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?

Options:

A.  

Audit and Legal

B.  

Budget and Compliance

C.  

Human Resources and Budget

D.  

Legal and Human Resources

Discussion 0
Questions 190

A security team member calls you to inform you that one of your databases might have been compromised, but there are no details available. As the security leader, what should you do?

Options:

A.  

Tell her to initiate the incident response plan

B.  

Tell her to provide updates as they become available

C.  

Tell her to disconnect the servers connected to the database and call the help desk

D.  

Tell her to perform initial forensics and preserve system integrity

Discussion 0
Questions 191

You have been hired as the Information System Security Officer (ISSO) for a US federal government agency. Your role is to ensure the security posture of the system is maintained. One of your tasks is to develop and maintain the system security plan (SSP) and supporting documentation.

Which of the following is NOT documented in the SSP?

Options:

A.  

The controls in place to secure the system

B.  

Name of the connected system

C.  

The results of a third-party audits and recommendations

D.  

Type of information used in the system

Discussion 0