Ensuring the correctness of data inputted to a system is an example of which facet of information security?
When establishing objectives for physical security environments, which of the following functional controls SHOULD occur first?
What advantage does the delivery of online security training material have over the distribution of printed media?
When undertaking disaster recovery planning, which of the following would NEVER be considered a "natural" disaster?
Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?
Which of the following statements relating to digital signatures is TRUE?
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
In business continuity, what is a battle box?
What term refers to the shared set of values within an organisation that determine how people are expected to behave in regard to information security?
When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.
You are undertaking a qualitative risk assessment of a likely security threat to an information system.
What is the MAIN issue with this type of risk assessment?
What type of attack attempts to exploit the trust relationship between a user client based browser and server based websites forcing the submission of an authenticated request to a third party site?
What Is the PRIMARY difference between DevOps and DevSecOps?
When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles is considered BEST practice?
For which security-related reason SHOULD staff monitoring critical CCTV systems be rotated regularly during each work session?
By what means SHOULD a cloud service provider prevent one client accessing data belonging to another in a shared server environment?
In order to maintain the currency of risk countermeasures, how often SHOULD an organisation review these risks?
Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?
Which of the following describes a qualitative risk assessment approach?
How does network visualisation assist in managing information security?
What Is the root cause as to why SMS messages are open to attackers and abuse?
Which of the following is MOST LIKELY to be described as a consequential loss?
A security analyst has been asked to provide a triple A service (AAA) for both wireless and remote access network services in an organization and must avoid using proprietary solutions.
What technology SHOULD they adapt?
When preserving a crime scene for digital evidence, what actions SHOULD a first responder initially make?
What are the different methods that can be used as access controls?
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
Which membership based organisation produces international standards, which cover good practice for information assurance?
What term is used to describe the testing of a continuity plan through a written scenario being used as the basis for discussion and simul-ation?
Which algorithm is a current specification for the encryption of electronic data established by NIST?
Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?