Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.
You have identified potential solutions for all of your risks that do not have security controls. What is the NEXT step?
A large number of accounts in a hardened system were suddenly compromised to an external party. Which of
the following is the MOST probable threat actor involved in this incident?
Which of the following defines the boundaries and scope of a risk assessment?
The process for management approval of the security certification process which states the risks and mitigation of such risks of a given IT system is called
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN.
What type of control is being implemented by supervisors and data owners?
When creating contractual agreements and procurement processes why should security requirements be included?
SCENARIO: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization’s needs.
The CISO is unsure of the information provided and orders a vendor proof of concept to validate the system’s scalability. This demonstrates which of the following?
Scenario: An organization has recently appointed a CISO. This is a new role in the organization and it signals the increasing need to address security consistently at the enterprise level. This new CISO, while confident with skills and experience, is constantly on the defensive and is unable to advance the IT security centric agenda.
From an Information Security Leadership perspective, which of the following is a MAJOR concern about the CISO’s approach to security?
A system is designed to dynamically block offending Internet IP-addresses from requesting services from a secure website. This type of control is considered
Which of the following provides an independent assessment of a vendor’s internal security controls and overall posture?
Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.
This global retail company is expected to accept credit card payments. Which of the following is of MOST concern when defining a security program for this organization?
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
After determining the audit findings are accurate, which of the following is the MOST logical next activity?
Which of the following is considered the foundation for the Enterprise Information Security Architecture (EISA)?
What process defines the framework of rules and practices by which a board of directors ensure accountability, fairness and transparency in an organization's relationship with its shareholders?
Where does bottom-up financial planning primarily gain information for creating budgets?
Which of the following is the MOST important reason for performing assessments of the security portfolio?
Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations.
An effective way to evaluate the effectiveness of an information security awareness program for end users, especially senior executives, is to conduct periodic:
What are the three hierarchically related aspects of strategic planning and in which order should they be done?
John is the project manager for a large project in his organization. A new change request has been proposed that will affect several areas of the project. One area of the project change impact is on work that a vendor has already completed. The vendor is refusing to make the changes as they’ve already completed the project work they were contracted to do. What can John do in this instance?
An organization has implemented a change management process for all changes to the IT production environment. This change management process follows best practices and is expected to help stabilize the availability and integrity of the organization’s IT environment. Which of the following can be used to measure the effectiveness of this newly implemented process:
Which of the following intellectual Property components is focused on maintaining brand recognition?
Which of the following is a term related to risk management that represents the estimated frequency at which a threat is expected to transpire?
In accordance with best practices and international standards, how often is security awareness training provided to employees of an organization?
When you develop your audit remediation plan what is the MOST important criteria?
When a CISO considers delaying or not remediating system vulnerabilities which of the following are MOST important to take into account?
A new CISO just started with a company and on the CISO's desk is the last complete Information Security Management audit report. The audit report is over two years old. After reading it, what should be the CISO's FIRST priority?
Which of the following reports should you as an IT auditor use to check on compliance with a service level agreement’s requirement for uptime?
An organization's Information Security Policy is of MOST importance because
The establishment of a formal risk management framework and system authorization program is essential. The LAST step of the system authorization process is:
The mean time to patch, number of virus outbreaks prevented, and number of vulnerabilities mitigated are examples of what type of performance metrics?
Which of the following international standards can be BEST used to define a Risk Management process in an organization?
At which point should the identity access management team be notified of the termination of an employee?
Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?
Which of the following is the MOST important reason to measure the effectiveness of an Information Security Management System (ISMS)?
An organization has defined a set of standard security controls. This organization has also defined the circumstances and conditions in which they must be applied. What is the NEXT logical step in applying the controls in the organization?
Your IT auditor is reviewing significant events from the previous year and has identified some procedural oversights. Which of the following would be the MOST concerning?
Which of the following is considered to be an IT governance framework and a supporting toolset that allows for managers to bridge the gap between control requirements, technical issues, and business risks?
An organization’s firewall technology needs replaced. A specific technology has been selected that is less costly than others and lacking in some important capabilities. The security officer has voiced concerns about sensitive data breaches but the decision is made to purchase. What does this selection indicate?
When dealing with Security Incident Response procedures, which of the following steps come FIRST when reacting to an incident?
An audit was conducted and many critical applications were found to have no disaster recovery plans in place. You conduct a Business Impact Analysis (BIA) to determine impact to the company for each application. What should be the NEXT step?
Which of the following is a critical operational component of an Incident Response Program (IRP)?
The BEST organization to provide a comprehensive, independent and certifiable perspective on established security controls in an environment is
Which of the following are primary concerns for management with regard to assessing internal control objectives?
The newly appointed CISO of an organization is reviewing the IT security strategic plan. Which of the following is the MOST important component of the strategic plan?
Scenario: As you begin to develop the program for your organization, you assess the corporate culture and determine that there is a pervasive opinion that the security program only slows things down and limits the performance of the “real workers.â€
Which group of people should be consulted when developing your security program?
An application vulnerability assessment has identified a security flaw in an application. This is a flaw that was previously identified and remediated on a prior release of the application. Which of the following is MOST likely the reason for this recurring issue?
Which of the following information may be found in table top exercises for incident response?
Which of the following is considered one of the most frequent failures in project management?
How often should the Statements of Standards for Attestation Engagements-16 (SSAE16)/International Standard on Assurance Engagements 3402 (ISAE3402) report of your vendors be reviewed?
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how hardware and software is implemented and managed within the organization. Which of the following principles does this best demonstrate?
To get an Information Security project back on schedule, which of the following will provide the MOST help?
This occurs when the quantity or quality of project deliverables is expanded from the original project plan.
Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?
A CISO sees abnormally high volumes of exceptions to security requirements and constant pressure from business units to change security processes. Which of the following represents the MOST LIKELY cause of this situation?
You manage a newly created Security Operations Center (SOC), your team is being inundated with security alerts and don’t know what to do. What is the BEST approach to handle this situation?
As the CISO for your company you are accountable for the protection of information resources commensurate with:
Risk appetite is typically determined by which of the following organizational functions?
In order for a CISO to have true situational awareness there is a need to deploy technology that can give a real-time view of security events across the enterprise. Which tool selection represents the BEST choice to achieve situational awareness?
Information Security is often considered an excessive, after-the-fact cost when a project or initiative is completed. What can be done to ensure that security is addressed cost effectively?
Which of the following can the company implement in order to avoid this type of security issue in the future?
Which of the following is the MOST important component of any change management process?
An organization has a stated requirement to block certain traffic on networks. The implementation of controls will disrupt a manufacturing process and cause unacceptable delays, resulting in sever revenue disruptions. Which of the following is MOST likely to be responsible for accepting the risk until mitigating controls can be implemented?
Acme Inc. has engaged a third party vendor to provide 99.999% up-time for their online web presence and had them contractually agree to this service level agreement. What type of risk tolerance is Acme exhibiting? (choose the BEST answer):
When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?
Which one of the following BEST describes which member of the management team is accountable for the day-to-day operation of the information security program?
Which of the following represents the best method of ensuring business unit alignment with security program requirements?
A severe security threat has been detected on your corporate network. As CISO you quickly assemble key members of the Information Technology team and business operations to determine a modification to security controls in response to the threat. This is an example of:
A person in your security team calls you at night and informs you that one of your web applications is potentially under attack from a cross-site scripting vulnerability. What do you do?
Which of the following is MOST beneficial in determining an appropriate balance between uncontrolled innovation and excessive caution in an organization?
Which of the following represents the BEST method of ensuring security program alignment to business needs?
During a cyber incident, which non-security personnel might be needed to assist the security team?
A Security Operations (SecOps) Manager is considering implementing threat hunting to be able to make better decisions on protecting information and assets.
What is the MAIN goal of threat hunting to the SecOps Manager?
You are the CISO for an investment banking firm. The firm is using artificial intelligence (AI) to assist in approving clients for loans.
Which control is MOST important to protect AI products?
What is the purpose of the statement of retained earnings of an organization?
What is a key policy that should be part of the information security plan?
With a focus on the review and approval aspects of board responsibilities, the Data Governance Council recommends that the boards provide strategic oversight regarding information and information security, include these four things:
When evaluating a Managed Security Services Provider (MSSP), which service(s) is/are most important:
From the CISO’s perspective in looking at financial statements, the statement of retained earnings of an organization:
You have been promoted to the CISO of a retail store. Which of the following compliance standards is the MOST important to the organization?
As the Risk Manager of an organization, you are task with managing vendor risk assessments. During the assessment, you identified that the vendor is engaged with high profiled clients, and bad publicity can jeopardize your own brand.
Which is the BEST type of risk that defines this event?
A key cybersecurity feature of a Personal Identification Verification (PIV) Card is:
In defining a strategic security plan for an organization, what should a CISO first analyze?
As the CISO, you are the project sponsor for a highly visible log management project. The objective of the project is to centralize all the enterprise logs into a security information and event management (SIEM) system. You requested the results of the performance quality audits activity.
The performance quality audit activity is done in what project management process group?
Which level of data destruction applies logical techniques to sanitize data in all user-addressable storage locations?
When reviewing a Solution as a Service (SaaS) provider’s security health and posture, which key document should you review?
A cloud computing environment that is bound together by technology that allows data and applications to be shared between public and private clouds is BEST referred to as a?
When managing a project, the MOST important activity in managing the expectations of stakeholders is:
Which of the following statements below regarding Key Performance indicators (KPIs) are true?
Which of the following is considered the MOST effective tool against social engineering?
An organization recently acquired a Data Loss Prevention (DLP) solution, and two months after the implementation, it was found that sensitive data was posted to numerous Dark Web sites. The DLP application was checked, and there are no apparent malfunctions and no errors.
What is the MOST likely reason why the sensitive data was posted?
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to organizational implementation and management requirements. Which of the following principles does this BEST demonstrate?
An auditor is reviewing the security classifications for a group of assets and finds that many of the assets are not correctly classified.
What should the auditor’s NEXT step be?
The process of creating a system which divides documents based on their security level to manage access to private data is known as
Security related breaches are assessed and contained through which of the following?
One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?
Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?
You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?
Your organization provides open guest wireless access with no captive portals. What can you do to assist with law enforcement investigations if one of your guests is suspected of committing an illegal act using your network?
Your incident handling manager detects a virus attack in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the incident handling process will utilize the signature to resolve this incident?
Which of the following is the MAIN security concern for public cloud computing?
SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
What type of attack requires the least amount of technical equipment and has the highest success rate?
Which of the following statements about Encapsulating Security Payload (ESP) is true?
An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?
The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?
Which of the following is a countermeasure to prevent unauthorized database access from web applications?
Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?
A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?
What is the FIRST step in developing the vulnerability management program?
The process for identifying, collecting, and producing digital information in support of legal proceedings is called
What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?
Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?
The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?
While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks
2.Scanning and enumeration
3.Maintaining Access
4.Reconnaissance
5.Gaining Access