Join the discussion
Question 1/335
To get an Information Security project back on schedule, which of the following will provide the MOST help?
Correct Answer: B
Add Comments
- Other Question (335q)
- Q1. To get an Information Security project back on schedule, which of the following will provi...
- Q2. You work as a project manager for TYU project. You are planning for risk mitigation. You n...
- Q3. Which of the following is the MOST effective way to measure the effectiveness of security ...
- Q4. An international organization is planning a project to implement encryption technologies t...
- Q5. What is the main purpose of the Incident Response Team?...
- Q6. Which of the following is a common technology for visual monitoring?...
- Q7. Which of the following will be MOST helpful for getting an Information Security project th...
- Q8. Network Forensics is the prerequisite for any successful legal action after attacks on you...
- Q9. Which of the following is the MAIN security concern for public cloud computing?...
- Q10. A system is designed to dynamically block offending Internet IP-addresses from requesting ...
- Q11. The risk found after a control has been fully implemented is called:...
- Q12. Which of the following functions evaluates patches used to close software vulnerabilities ...
- Q13. When an organization claims it is secure because it is PCI-DSS certified, what is a good f...
- Q14. SCENARIO: A CISO has several two-factor authentication systems under review and selects th...
- Q15. Which of the following is a common technology for visual monitoring?...
- Q16. A department within your company has proposed a third party vendor solution to address an ...
- Q17. Your penetration testing team installs an in-line hardware key logger onto one of your net...
- Q18. Credit card information, medical data, and government records are all examples of:...
- Q19. The main purpose of the SOC is:
- Q20. A severe security threat has been detected on your corporate network. As CISO you quickly ...
- Q21. You have implemented the new controls. What is the next step?...
- Q22. Scenario: An organization has recently appointed a CISO. This is a new role in the organiz...
- Q23. Which of the following functions implements and oversees the use of controls to reduce ris...
- Q24. Michael starts a new job and discovers that he has unnecessary access to a variety of syst...
- Q25. Your IT auditor is reviewing significant events from the previous year and has identified ...
- Q26. Creating good security metrics is essential for a CISO. What would be the BEST sources for...
- Q27. Which of the following is the BEST indicator of a successful project?...
- Q28. Which of the following conditions would be the MOST probable reason for a security project...
- Q29. Which of the following functions implements and oversees the use of controls to reduce ris...
- Q30. Which of the following should be determined while defining risk management strategies?...
- Q31. The executive board has requested that the CISO of an organization define and Key Performa...
- Q32. Scenario: Your company has many encrypted telecommunications links for their world-wide op...
- Q33. An employee successfully avoids becoming a victim of a sophisticated spear phishing attack...
- Q34. Which of the following is a major benefit of applying risk levels?...
- Q35. Scenario: Your company has many encrypted telecommunications links for their world-wide op...
- Q36. Which of the following is a countermeasure to prevent unauthorized database access from we...
- Q37. Risk that remains after risk mitigation is known as...
- Q38. Acceptable levels of information security risk tolerance in an organization should be dete...
- Q39. Which of the following international standards can be BEST used to define a Risk Managemen...
- Q40. SCENARIO: A CISO has several two-factor authentication systems under review and selects th...
- Q41. You are just hired as the new CISO and are being briefed on all the Information Security p...
- Q42. What is the primary reason for performing a return on investment analysis?...
- Q43. Which of the following best describes the purpose of the International Organization for St...
- Q44. The organization does not have the time to remediate the vulnerability; however it is crit...
- Q45. A cloud computing environment that is bound together by technology that allows data and ap...
- Q46. Scenario: As you begin to develop the program for your organization, you assess the corpor...
- Q47. A security professional has been promoted to be the CISO of an organization. The first tas...
- Q48. ABC Limited has recently suffered a security breach with customers' social security number...
- Q49. When selecting a security solution with reoccurring maintenance costs after the first year...
- Q50. With respect to the audit management process, management response serves what function?...
- Q51. When you develop your audit remediation plan what is the MOST important criteria?...
- Q52. Which is the BEST solution to monitor, measure, and report changes to critical data in a s...
- Q53. Assigning the role and responsibility of Information Assurance to a dedicated and independ...
- Q54. Risk that remains after risk mitigation is known as...
- Q55. Which of the following is a term related to risk management that represents the estimated ...
- Q56. When creating contractual agreements and procurement processes why should security require...
- Q57. An organization has a stated requirement to block certain traffic on networks. The impleme...
- Q58. The Information Security Management program MUST protect:...
- Q59. When a critical vulnerability has been discovered on production systems and needs to be fi...
- Q60. How often should the Statements of Standards for Attestation Engagements-16 (SSAE16)/Inter...
- Q61. Risk appetite directly affects what part of a vulnerability management program?...
- Q62. A new CISO just started with a company and on the CISO's desk is the last complete Informa...
- Q63. In accordance with best practices and international standards, how often is security aware...
- Q64. An organization information security policy serves to...
- Q65. Scenario: You are the newly hired Chief Information Security Officer for a company that ha...
- Q66. A customer of a bank has placed a dispute on a payment for a credit card account. The bank...
- Q67. When updating the security strategic planning document what two items must be included?...
- Q68. Scenario: Critical servers show signs of erratic behavior within your organization's intra...
- Q69. Risk is defined as:
- Q70. You have recently drafted a revised information security policy. From whom should you seek...
- Q71. Scenario: An organization has made a decision to address Information Security formally and...
- Q72. Which of the following best represents a calculation for Annual Loss Expectancy (ALE)?...
- Q73. When analyzing and forecasting a capital expense budget what are not included?...
- Q74. After a risk assessment is performed, a particular risk is considered to have the potentia...
- Q75. You are the Chief Information Security Officer of a large, multinational bank and you susp...
- Q76. The single most important consideration to make when developing your security program, pol...
- Q77. You manage a newly created Security Operations Center (SOC), your team is being inundated ...
- Q78. Which of the following will be MOST helpful for getting an Information Security project th...
- Q79. What is the SECOND step to creating a risk management methodology according to the Nationa...
- Q80. Scenario: Your company has many encrypted telecommunications links for their world-wide op...
- Q81. If a competitor wants to cause damage to your organization, steal critical secrets, or put...
- Q82. Which of the following is a benefit of information security governance?...
- Q83. During the 3rd quarter of a budget cycle, the CISO noticed she spent more than was origina...
- Q84. SQL injection is a very popular and successful injection attack method. Identify the basic...
- Q85. Which of the following best represents a calculation for Annual Loss Expectancy (ALE)?...
- Q86. Which of the following is an accurate statement regarding capital expenses?...
- Q87. A company wants to fill a Chief Information Security Officer position in the organization....
- Q88. Which of the following provides an audit framework?...
- Q89. The single most important consideration to make when developing your security program, pol...
- Q90. XYZ is a publicly-traded software development company. Who is ultimately accountable to th...
- Q91. SQL injection is a very popular and successful injection attack method. Identify the basic...
- Q92. Credit card information, medical data, and government records are all examples of:...
- Q93. When a critical vulnerability has been discovered on production systems and needs to be fi...
- Q94. The newly appointed CISO of an organization is reviewing the IT security strategic plan. W...
- Q95. As a new CISO at a large healthcare company you are told that everyone has to badge in to ...
- Q96. A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the...
- Q97. Scenario: Your corporate systems have been under constant probing and attack from foreign ...
- Q98. A Security Operations Centre (SOC) manager is informed that a database containing highly s...
- Q99. As a CISO you need to understand the steps that are used to perform an attack against a ne...
- Q100. Which of the following is used to lure attackers into false environments so they can be mo...
- Q101. When choosing a risk mitigation method what is the MOST important factor?...
- Q102. The process of identifying and classifying assets is typically included in the...
- Q103. SQL injection is a very popular and successful injection attack method. Identify the basic...
- Q104. Physical security measures typically include which of the following components?...
- Q105. The FIRST step in establishing a security governance program is to?...
- Q106. According to ISO 27001, of the steps for establishing an Information Security Governance p...
- Q107. Which of the following is a fundamental component of an audit record?...
- Q108. What are the primary reasons for the development of a business case for a security project...
- Q109. Which type of scan is used on the eye to measure the layer of blood vessels?...
- Q110. Which of the following reports should you as an IT auditor use to check on compliance with...
- Q111. Within an organization's vulnerability management program, who has the responsibility to i...
- Q112. A security manager has created a risk program. Which of the following is a critical part o...
- Q113. An audit was conducted and many critical applications were found to have no disaster recov...
- Q114. The Security Operations Center (SOC) just purchased a new intrusion prevention system (IPS...
- Q115. What is the definition of Risk in Information Security?...
- Q116. One of the MAIN goals of a Business Continuity Plan is to_______________....
- Q117. Which of the following is MOST important when dealing with an Information Security Steerin...
- Q118. Which technology can provide a computing environment without requiring a dedicated hardwar...
- Q119. When working in the Payment Card Industry (PCI), how often should security logs be review ...
- Q120. At what level of governance are individual projects monitored and managed?...
- Q121. Which of the following is the MOST effective method for discovering common technical vulne...
- Q122. Scenario: An organization has made a decision to address Information Security formally and...
- Q123. This occurs when the quantity or quality of project deliverables is expanded from the orig...
- Q124. The security team has investigated the theft/loss of several unencrypted laptop computers ...
- Q125. When managing a project, the MOST important activity in managing the expectations of stake...
- Q126. A CISO has recently joined an organization with a poorly implemented security program. The...
- Q127. With respect to the audit management process, management response serves what function?...
- Q128. Scenario: An organization has made a decision to address Information Security formally and...
- Q129. While designing a secondary data center for your company what document needs to be analyze...
- Q130. An organization has implemented a change management process for all changes to the IT prod...
- Q131. The executive board has requested that the CISO of an organization define and Key Performa...
- Q132. A person in your security team calls you at night and informs you that one of your web app...
- Q133. One of the MAIN goals of a Business Continuity Plan is to...
- Q134. Your IT auditor is reviewing significant events from the previous year and has identified ...
- Q135. The process of identifying and classifying assets is typically included in the____________...
- Q136. Creating good security metrics is essential for a CISO. What would be the BEST sources for...
- Q137. You are the CISO of a commercial social media organization. The leadership wants to rapidl...
- Q138. An information security department is required to remediate system vulnerabilities when th...
- Q139. IT control objectives are useful to IT auditors as they provide the basis for understandin...
- Q140. Which of the following best describes the purpose of the International Organization for St...
- Q141. Which of the following is the MOST important for a CISO to understand when identifying thr...
- Q142. From the CISO's perspective in looking at financial statements, the statement of retained ...
- Q143. In order for a CISO to have true situational awareness there is a need to deploy technolog...
- Q144. The framework that helps to define a minimum standard of protection that business stakehol...
- Q145. After a risk assessment is performed, a particular risk is considered to have the potentia...
- Q146. The Security Operations Center (SOC) just purchased a new intrusion prevention system (IPS...
- Q147. A missing/ineffective security control is identified. Which of the following should be the...
- Q148. A CISO sees abnormally high volumes of exceptions to security requirements and constant pr...
- Q149. What are the primary reasons for the development of a business case for a security project...
- Q150. What is an approach to estimating the strengths and weaknesses of alternatives used to det...
- Q151. Which of the following terms is used to describe countermeasures implemented to minimize r...
- Q152. A recommended method to document the respective roles of groups and individuals for a give...
- Q153. Regulatory requirements typically force organizations to implement ____________....
- Q154. What oversight should the information security team have in the change management process ...
- Q155. Physical security measures typically include which of the following components?...
- Q156. Acme Inc. has engaged a third party vendor to provide 99.999% up-time for their online web...
- Q157. When dealing with risk, the information security practitioner may choose to:...
- Q158. When creating contractual agreements and procurement processes why should security require...
- Q159. Which of the following represents the BEST method for obtaining business unit acceptance o...
- Q160. While designing a secondary data center for your company what document needs to be analyze...
- Q161. How often should an environment be monitored for cyber threats, risks, and exposures?...
- Q162. Scenario: You are the CISO and have just completed your first risk assessment for your org...
- Q163. When would it be more desirable to develop a set of decentralized security policies and pr...
- Q164. Which of the following is considered to be an IT governance framework and a supporting too...
- Q165. One of your executives needs to send an important and confidential email. You want to ensu...
- Q166. Scenario: An organization has recently appointed a CISO. This is a new role in the organiz...
- Q167. Scenario: Most industries require compliance with multiple government regulations and/or i...
- Q168. A missing/ineffective security control is identified. Which of the following should be the...
- Q169. Smith, the project manager for a larger multi-location firm, is leading a software project...
- Q170. An audit was conducted and many critical applications were found to have no disaster recov...
- Q171. A person in your security team calls you at night and informs you that one of your web app...
- Q172. Which of the following BEST describes an international standard framework that is based on...
- Q173. Which of the following organizations is typically in charge of validating the implementati...
- Q174. SCENARIO: A CISO has several two-factor authentication systems under review and selects th...
- Q175. At which point should the identity access management team be notified of the termination o...
- Q176. You work as a project manager for TYU project. You are planning for risk mitigation. You n...
- Q177. A newly appointed security officer finds data leakage software licenses that had never bee...
- Q178. Access Control lists (ACLs), Firewalls, and Intrusion Prevention Systems are examples of...
- Q179. An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertex...
- Q180. Which of the following can the company implement in order to avoid this type of security i...
- Q181. Which of the following is MOST useful when developing a business case for security initiat...
- Q182. A security professional has been promoted to be the CISO of an organization. The first tas...
- Q183. Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY...
- Q184. Your company has a "no right to privacy" notice on all logon screens for your information ...
- Q185. Scenario: A Chief Information Security Officer (CISO) recently had a third party conduct a...
- Q186. A customer of a bank has placed a dispute on a payment for a credit card account. The bank...
- Q187. Which of the following is critical in creating a security program aligned with an organiza...
- Q188. What is the definition of Risk in Information Security?...
- Q189. Scenario: An organization has recently appointed a CISO. This is a new role in the organiz...
- Q190. How often should the SSAE16 report of your vendors be reviewed?...
- Q191. Which of the following is the MOST important goal of risk management?...
- Q192. The Information Security Management program MUST protect:...
- Q193. When a CISO considers delaying or not remediating system vulnerabilities which of the foll...
- Q194. A new CISO just started with a company and on the CISO's desk is the last complete Informa...
- Q195. The process of identifying and classifying assets is typically included in the...
- Q196. A method to transfer risk is to:
- Q197. As a CISO you need to understand the steps that are used to perform an attack against a ne...
- Q198. SCENARIO: A CISO has several two-factor authentication systems under review and selects th...
- Q199. Creating a secondary authentication process for network access would be an example of?...
- Q200. The effectiveness of social engineering penetration testing using phishing can be used as ...
- Q201. Which of the following backup sites takes the longest recovery time?...
- Q202. What is meant by password aging?
- Q203. Which of the following methods are used to define contractual obligations that force a ven...
- Q204. A global retail organization is looking to implement a consistent Disaster Recovery and Bu...
- Q205. You manage a newly created Security Operations Center (SOC), your team is being inundated ...
- Q206. A department within your company has proposed a third party vendor solution to address an ...
- Q207. Which of the following is the MAIN reason to follow a formal risk management process in an...
- Q208. When dealing with Security Incident Response procedures, which of the following steps come...
- Q209. The process for management approval of the security certification process which states the...
- Q210. SCENARIO: Critical servers show signs of erratic behavior within your organization's intra...
- Q211. An organization licenses and uses personal information for business operations, and a serv...
- Q212. An organization is required to implement background checks on all employees with access to...
- Q213. The total cost of security controls should:
- Q214. Which wireless encryption technology makes use of temporal keys?...
- Q215. An information security department is required to remediate system vulnerabilities when th...
- Q216. The patching and monitoring of systems on a consistent schedule is required by?...
- Q217. When you develop your audit remediation plan what is the MOST important criteria?...
- Q218. Devising controls for information security is a balance between?...
- Q219. Which of the following represents the BEST reason for an organization to use the Control O...
- Q220. Scenario: Critical servers show signs of erratic behavior within your organization's intra...
- Q221. You are just hired as the new CISO and are being briefed on all the Information Security p...
- Q222. Which of the following best describes the purpose of the International Organization for St...
- Q223. The process for management approval of the security certification process which states the...
- Q224. Scenario: You are the CISO and have just completed your first risk assessment for your org...
- Q225. Which of the following are necessary to formulate responses to external audit findings?...
- Q226. The ability to demand the implementation and management of security controls on third part...
- Q227. Your company has a "no right to privacy" notice on all logon screens for your information ...
- Q228. You have implemented a new security control. Which of the following risk strategy options ...
- Q229. A global health insurance company is concerned about protecting confidential information. ...
- Q230. Using the Transport Layer Security (TLS) protocol enables a client in a network to be:...
- Q231. Which of the following is MOST useful when developing a business case for security initiat...
- Q232. When analyzing and forecasting an operating expense budget what are not included?...
- Q233. According to the National Institute of Standards and Technology (NIST) SP 800-40, which of...
- Q234. Scenario: Your organization employs single sign-on (user name and password only) as a conv...
- Q235. Which of the following represents the BEST method of ensuring security program alignment t...
- Q236. The Annualized Loss Expectancy (Before) minus Annualized Loss Expectancy (After) minus Ann...
- Q237. In defining a strategic security plan for an organization, what should a CISO first analyz...
- Q238. Your company has limited resources to spend on security initiatives. The Chief Financial O...
- Q239. The mean time to patch, number of virus outbreaks prevented, and number of vulnerabilities...
- Q240. What is the BEST way to achieve on-going compliance monitoring in an organization?...
- Q241. When is an application security development project complete?...
- Q242. What two methods are used to assess risk impact?...
- Q243. A bastion host should be placed:
- Q244. Network Forensics is the prerequisite for any successful legal action after attacks on you...
- Q245. An organization has defined a set of standard security controls. This organization has als...
- Q246. The FIRST step in establishing a security governance program is to?...
- Q247. Which of the following are the triple constraints of project management?...
- Q248. As the Risk Manager of an organization, you are task with managing vendor risk assessments...
- Q249. According to ISO 27001, of the steps for establishing an Information Security Governance p...
- Q250. Scenario: A Chief Information Security Officer (CISO) recently had a third party conduct a...
- Q251. Scenario: Your corporate systems have been under constant probing and attack from foreign ...
- Q252. Which of the following has the GREATEST impact on the implementation of an information sec...
- Q253. Involvement of senior management is MOST important in the development of:...
- Q254. A CISO wants to change the defense strategy to ward off attackers. To accomplish this the ...
- Q255. Risk appetite is typically determined by which of the following organizational functions?...
- Q256. Which of the following activities must be completed BEFORE you can calculate risk?...
- Q257. Which of the following best describes an access control process that confirms the identity...
- Q258. Which of the following is MOST beneficial in determining an appropriate balance between un...
- Q259. Which of the following intellectual Property components is focused on maintaining brand re...
- Q260. Which of the following is critical in creating a security program aligned with an organiza...
- Q261. In order for a CISO to have true situational awareness there is a need to deploy technolog...
- Q262. Which of the following is a weakness of an asset or group of assets that can be exploited ...
- Q263. When managing the critical path of an IT security project, which of the following is MOST ...
- Q264. Which of the following is true regarding expenditures?...
- Q265. An organization is required to implement background checks on all employees with access to...
- Q266. A CISO implements smart cards for credential management, and as a result has reduced costs...
- Q267. A university recently hired a CISO. One of the first tasks is to develop a continuity of o...
- Q268. In order for a CISO to have true situational awareness there is a need to deploy technolog...
- Q269. The amount of risk an organization is willing to accept in pursuit of its mission is known...
- Q270. The CIO of an organization has decided to assign the responsibility of internal IT audit t...
- Q271. A recommended method to document the respective roles of groups and individuals for a give...
- Q272. When should IT security project management be outsourced?...
- Q273. Which business stakeholder is accountable for the integrity of a new information system?...
- Q274. Which of the following is used to establish and maintain a framework to provide assurance ...
- Q275. Which of the following tests is performed by an Information Systems (IS) auditor when a sa...
- Q276. When entering into a third party vendor agreement for security services, at what point in ...
- Q277. The primary purpose of a risk register is to:
- Q278. Scenario: Your corporate systems have been under constant probing and attack from foreign ...
- Q279. When deploying an Intrusion Prevention System (IPS) the BEST way to get maximum protection...
- Q280. Which of the following is a fundamental component of an audit record?...
- Q281. Which of the following is a symmetric encryption algorithm?...
- Q282. A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the...
- Q283. An organization is looking for a framework to measure the efficiency and effectiveness of ...
- Q284. Which represents PROPER separation of duties in the corporate environment?...
- Q285. Scenario: An organization has recently appointed a CISO. This is a new role in the organiz...
- Q286. Which of the following would negatively impact a log analysis of a multinational organizat...
- Q287. Which of the following is the BEST indicator of a successful project?...
- Q288. The MOST common method to get an unbiased measurement of the effectiveness of an Informati...
- Q289. Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?...
- Q290. What is the BEST reason for having a formal request for proposal process?...
- Q291. Scenario: Your organization employs single sign-on (user name and password only) as a conv...
- Q292. Scenario: Most industries require compliance with multiple government regulations and/or i...
- Q293. The company decides to release the application without remediating the high-risk vulnerabi...
- Q294. A Chief Information Security Officer received a list of high, medium, and low impact audit...
- Q295. You are the Chief Information Security Officer of a large, multinational bank and you susp...
- Q296. A system is designed to dynamically block offending Internet IP-addresses from requesting ...
- Q297. You work as a project manager for TYU project. You are planning for risk mitigation. You n...
- Q298. An organization's firewall technology needs replaced. A specific technology has been selec...
- Q299. The CIO of an organization has decided to assign the responsibility of internal IT audit t...
- Q300. Which of the following reports should you as an IT auditor use to check on compliance with...
- Q301. The security team has investigated the theft/loss of several unencrypted laptop computers ...
- Q302. When should IT security project management be outsourced?...
- Q303. You are the CISO of a commercial social media organization. The leadership wants to rapidl...
- Q304. Which of the following reports should you as an IT auditor use to check on compliance with...
- Q305. Who in the organization determines access to information?...
- Q306. Which of the following provides an independent assessment of a vendor's internal security ...
- Q307. Control Objectives for Information and Related Technology (COBIT) is which of the followin...
- Q308. How often should the Statements of Standards for Attestation Engagements-16 (SSAE16)/Inter...
- Q309. Scenario: You are the CISO and have just completed your first risk assessment for your org...
- Q310. Which of the following is a benefit of a risk-based approach to audit planning?...
- Q311. Which of the following strategies provides the BEST response to a ransomware attack?...
- Q312. Scenario: Your organization employs single sign-on (user name and password only) as a conv...
- Q313. Scenario: As you begin to develop the program for your organization, you assess the corpor...
- Q314. A stakeholder is a person or group:
- Q315. When briefing senior management on the creation of a governance process, the MOST importan...
- Q316. When should IT security project management be outsourced?...
- Q317. What type of attack requires the least amount of technical equipment and has the highest s...
- Q318. Which of the following international standards can be BEST used to define a Risk Managemen...
- Q319. An organization's Information Security Policy is of MOST importance because...
- Q320. You have been hired as the Information System Security Officer (ISSO) for a US federal gov...
- Q321. Which of the following functions implements and oversees the use of controls to reduce ris...
- Q322. Scenario: An organization has recently appointed a CISO. This is a new role in the organiz...
- Q323. Scenario: Your company has many encrypted telecommunications links for their world-wide op...
- Q324. Scenario: Your corporate systems have been under constant probing and attack from foreign ...
- Q325. The newly appointed CISO of an organization is reviewing the IT security strategic plan. W...
- Q326. You have recently drafted a revised information security policy. From whom should you seek...
- Q327. Scenario: Your corporate systems have been under constant probing and attack from foreign ...
- Q328. An organization has a number of Local Area Networks (LANs) linked to form a single Wide Ar...
- Q329. Payment Card Industry (PCI) compliance requirements are based on what criteria?...
- Q330. As the CISO you need to write the IT security strategic plan. Which of the following is th...
- Q331. Your company has limited resources to spend on security initiatives. The Chief Financial O...
- Q332. Within an organization's vulnerability management program, who has the responsibility to i...
- Q333. Dataflow diagrams are used by IT auditors to:
- Q334. In accordance with best practices and international standards, how often is security aware...
- Q335. The security team has investigated the theft/loss of several unencrypted laptop computers ...
