Join the discussion
Add Comments
- Other Question (66q)
- Q1. In business continuity, what is a battle box?
- Q2. When securing a wireless network, which of the following is NOT best practice?...
- Q3. Why should a loading bay NEVER be used as a staff entrance?...
- Q4. What aspect of an employee's contract of employment Is designed to prevent the unauthorise...
- Q5. In business continuity (BC) terms, what is the name of the individual responsible for reco...
- Q6. What term refers to the shared set of values within an organisation that determine how peo...
- Q7. The policies, processes, practices, and tools used to align the business value of informat...
- Q8. When seeking third party digital forensics services, what two attributes should one seek w...
- Q9. What term is used to describe the testing of a continuity plan through a written scenario ...
- Q10. As well as being permitted to access, create, modify and delete information, what right do...
- Q11. In a virtualised cloud environment, what component is responsible for the secure separatio...
- Q12. In order to better improve the security culture within an organisation with a top down app...
- Q13. What are the different methods that can be used as access controls? 1. Detective. 2. Physi...
- Q14. By what means SHOULD a cloud service provider prevent one client accessing data belonging ...
- Q15. When handling and investigating digital evidence to be used in a criminal cybercrime inves...
- Q16. In order to maintain the currency of risk countermeasures, how often SHOULD an organisatio...
- Q17. Which of the following is MOST LIKELY to be described as a consequential loss?...
- Q18. When securing a wireless network, which of the following is NOT best practice?...
- Q19. Which term describes the acknowledgement and acceptance of ownership of actions, decisions...
- Q20. Which of the following statements relating to digital signatures is TRUE?...
- Q21. Which of the following is a framework and methodology for Enterprise Security Architecture...
- Q22. How does network visualisation assist in managing information security?...
- Q23. What Is the PRIMARY security concern associated with the practice known as Bring Your Own ...
- Q24. When handling and investigating digital evidence to be used in a criminal cybercrime inves...
- Q25. Which of the following subjects is UNLIKELY to form part of a cloud service provision laaS...
- Q26. Which of the following cloud delivery models is NOT intrinsically "trusted" in terms of se...
- Q27. How might the effectiveness of a security awareness program be effectively measured? 1) Em...
- Q28. According to ISO/IEC 27000, which of the following is the definition of a vulnerability?...
- Q29. For which security-related reason SHOULD staff monitoring critical CCTV systems be rotated...
- Q30. Which of the following is NOT an information security specific vulnerability?...
- Q31. Why might the reporting of security incidents that involve personal data differ from other...
- Q32. When an organisation decides to operate on the public cloud, what does it lose?...
- Q33. Which of the following is considered to be the GREATEST risk to information systems that r...
- Q34. When preserving a crime scene for digital evidence, what actions SHOULD a first responder ...
- Q35. Geoff wants to ensure the application of consistent security settings to devices used thro...
- Q36. Ensuring the correctness of data inputted to a system is an example of which facet of info...
- Q37. Which of the following controls would be the MOST relevant and effective in detecting zero...
- Q38. James is working with a software programme that completely obfuscates the entire source co...
- Q39. One traditional use of a SIEM appliance is to monitor for exceptions received via syslog. ...
- Q40. Which term is used to describe the set of processes that analyses code to ensure defined c...
- Q41. What Is the PRIMARY difference between DevOps and DevSecOps?...
- Q42. What Is the root cause as to why SMS messages are open to attackers and abuse?...
- Q43. What does a penetration test do that a Vulnerability Scan does NOT?...
- Q44. In order to maintain the currency of risk countermeasures, how often SHOULD an organisatio...
- Q45. Which of the following is a framework and methodology for Enterprise Security Architecture...
- Q46. What form of attack against an employee has the MOST impact on their compliance with the o...
- Q47. Which term describes a vulnerability that is unknown and therefore has no mitigating contr...
- Q48. How does network visualisation assist in managing information security?...
- Q49. You are undertaking a qualitative risk assessment of a likely security threat to an inform...
- Q50. Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on i...
- Q51. Which types of organisations are likely to be the target of DDoS attacks?...
- Q52. Which term describes the acknowledgement and acceptance of ownership of actions, decisions...
- Q53. Which type of facility is enabled by a contract with an alternative data processing facili...
- Q54. In terms of security culture, what needs to be carried out as an integral part of security...
- Q55. Which of the following acronyms covers the real-time analysis of security alerts generated...
- Q56. By what means SHOULD a cloud service provider prevent one client accessing data belonging ...
- Q57. Which of the following is an accepted strategic option for dealing with risk?...
- Q58. Once data has been created In a standard information lifecycle, what step TYPICALLY happen...
- Q59. Which of the following is NOT considered to be a form of computer misuse?...
- Q60. Which of the following acronyms covers the real-time analysis of security alerts generated...
- Q61. Why should a loading bay NEVER be used as a staff entrance?...
- Q62. What types of web application vulnerabilities continue to be the MOST prolific according t...
- Q63. The policies, processes, practices, and tools used to align the business value of informat...
- Q64. A system administrator has created the following "array" as an access control for an organ...
- Q65. What type of attack attempts to exploit the trust relationship between a user client based...
- Q66. When preserving a crime scene for digital evidence, what actions SHOULD a first responder ...
