When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles is considered BEST practice?
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
The policies, processes, practices, and tools used to align the business value of information with the most appropriate and cost-effective infrastructure from the time information is conceived through its final disposition.
Which of the below business practices does this statement define?
Which of the following controls would be the MOST relevant and effective in detecting zero day attacks?
James is working with a software programme that completely obfuscates the entire source code, often in the form of a binary executable making it difficult to inspect, manipulate or reverse engineer the original source code.
What type of software programme is this?
Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?
One traditional use of a SIEM appliance is to monitor for exceptions received via syslog.
What system from the following does NOT natively support syslog events?
Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.
When undertaking disaster recovery planning, which of the following would NEVER be considered a "natural" disaster?
Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?
Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?
Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?
What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controls procedures during a critical emergency situation?
Ensuring the correctness of data inputted to a system is an example of which facet of information security?
In business continuity (BC) terms, what is the name of the individual responsible for recording all pertinent information associated with a BC exercise or real plan invocation?
What Is the KEY purpose of appending security classification labels to information?
What type of attack could directly affect the confidentiality of an unencrypted VoIP network?
Which type of facility is enabled by a contract with an alternative data processing facility which will provide HVAC, power and communications infrastructure as well computing hardware and a duplication of organisations existing "live" data?
Which of the following is NOT an information security specific vulnerability?
What Is the first yet MOST simple and important action to take when setting up a new web server?
As well as being permitted to access, create, modify and delete information, what right does an Information Owner NORMALLY have in regard to their information?
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?
Which algorithm is a current specification for the encryption of electronic data established by NIST?