The new CISO was informed of all the Information Security projects that the organization has in progress. Two projects are over a year behind schedule and over budget. Using best business practices for project management you determine that the project correctly aligns with the company goals.
Which of the following needs to be performed NEXT?
When creating contractual agreements and procurement processes why should security requirements be included?
The process for management approval of the security certification process which states the risks and mitigation of such risks of a given IT system is called
Which of the following best describes an access control process that confirms the identity of the entity seeking
access to a logical or physical area?
Scenario: You are the CISO and have just completed your first risk assessment for your organization. You find many risks with no security controls, and some risks with inadequate controls. You assign work to your staff to create or adjust existing security controls to ensure they are adequate for risk mitigation needs.
When formulating the remediation plan, what is a required input?
What is the BEST reason for having a formal request for proposal process?
Which of the following is true regarding expenditures?
The process to evaluate the technical and non-technical security controls of an IT system to validate that a given design and implementation meet a specific set of security requirements is called
SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
During initial investigation, the team suspects criminal activity but cannot initially prove or disprove illegal actions. What is the MOST critical aspect of the team’s activities?
What is the difference between encryption and tokenization?
A digital signature addresses which of the following concerns?
Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements. During your investigation of the rumored compromise you discover that data has been breached and you have discovered the repository of stolen data on a server located in a foreign country. Your team now has full access to the data on the foreign server.
What action should you take FIRST?
Acceptable levels of information security risk tolerance in an organization should be determined by?
Which of the following would negatively impact a log analysis of a multinational organization?
Scenario: Most industries require compliance with multiple government regulations and/or industry standards to meet data protection and privacy mandates.
What is one proven method to account for common elements found within separate regulations and/or standards?
Which of the following is the MOST logical method of deploying security controls within an organization?
Which of the following best describes revenue?
As the Chief Information Security Officer, you want to ensure data shared securely, especially when shared with
third parties outside the organization. What protocol provides the ability to extend the network perimeter with
the use of encapsulation and encryption?
Which of the following information would MOST likely be reported at the board-level within an organization?
What is one key difference between Capital expenditures and Operating expenditures?
As the CISO you need to write the IT security strategic plan. Which of the following is the MOST important to review before you start writing the plan?
As the Business Continuity Coordinator of a financial services organization, you are responsible for ensuring assets are recovered timely in the event of a disaster. Which is the BEST Disaster Recovery performance indicator to validate that you are prepared for a disaster?
A large number of accounts in a hardened system were suddenly compromised to an external party. Which of
the following is the MOST probable threat actor involved in this incident?
Which of the following is the MOST important reason for performing assessments of the security portfolio?
Scenario: The new CISO was informed of all the Information Security projects that the section has in progress. Two projects are over a year behind schedule and way over budget.
Which of the following will be most helpful for getting an Information Security project that is behind schedule back on schedule?
When analyzing and forecasting an operating expense budget what are not included?
Smith, the project manager for a larger multi-location firm, is leading a software project team that has 18
members, 5 of which are assigned to testing. Due to recent recommendations by an organizational quality audit
team, the project manager is convinced to add a quality professional to lead to test team at additional cost to
the project.
The project manager is aware of the importance of communication for the success of the project and takes the
step of introducing additional communication channels, making it more complex, in order to assure quality
levels of the project. What will be the first project management document that Smith should change in order to
accommodate additional communication channels?
Scenario: An organization has made a decision to address Information Security formally and consistently by adopting established best practices and industry standards. The organization is a small retail merchant but it is expected to grow to a global customer base of many millions of customers in just a few years.
Which of the following would be the FIRST step when addressing Information Security formally and consistently in this organization?
ABC Limited has recently suffered a security breach with customers’ social security number available on the dark web for sale. The CISO, during the time of the incident, has been fired, and you have been hired as the replacement. The analysis of the breach found that the absence of an insider threat program, lack of least privilege policy, and weak access control was to blame. You would like to implement key performance indicators to mitigate the risk.
Which metric would meet the requirement?
What is a key policy that should be part of the information security plan?
The alerting, monitoring, and lifecycle management of security-related events are typically managed by the:
What is the THIRD state of the Tuckman Stages of Group Development?
Which of the following BEST mitigates ransomware threats?
A cloud computing environment that is bound together by technology that allows data and applications to be shared between public and private clouds is BEST referred to as a?
You have been promoted to the CISO of a retail store. Which of the following compliance standards is the MOST important to the organization?
XYZ is a publicly-traded software development company.
Who is ultimately accountable to the shareholders in the event of a cybersecurity breach?
When managing a project, the MOST important activity in managing the expectations of stakeholders is:
The ability to require implementation and management of security controls within third-party provided services is a critical part of:
What is a Statement of Objectives (SOA)?
Who is responsible for verifying that audit directives are implemented?
Which of the following provides the BEST approach to achieving positive outcomes while preserving savings?
From the CISO’s perspective in looking at financial statements, the statement of retained earnings of an organization:
A Security Operations (SecOps) Manager is considering implementing threat hunting to be able to make better decisions on protecting information and assets.
What is the MAIN goal of threat hunting to the SecOps Manager?
Many successful cyber-attacks currently include:
Of the following types of SOCs (Security Operations Centers), which one would be MOST likely used if the CISO has decided to outsource the infrastructure and administration of it?
As the CISO, you are the project sponsor for a highly visible log management project. The objective of the project is to centralize all the enterprise logs into a security information and event management (SIEM) system. You requested the results of the performance quality audits activity.
The performance quality audit activity is done in what project management process group?
Which of the following is the MOST important to share with an Information Security Steering Committee:
Many successful cyber-attacks currently include:
A CISO must conduct risk assessments using a method where the Chief Financial Officer (CFO) receives impact data in financial terms to use as input to select the proper level of coverage in a new cybersecurity insurance policy.
What is the MOST effective method of risk analysis to provide the CFO with the information required?
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to organizational implementation and management requirements. Which of the following principles does this BEST demonstrate?
You have been promoted to the CISO of a big-box retail store chain reporting to the Chief Information Officer (CIO). The CIO’s first mandate to you is to develop a cybersecurity compliance framework that will meet all the store’s compliance requirements.
Which of the following compliance standard is the MOST important to the organization?
As the Risk Manager of an organization, you are task with managing vendor risk assessments. During the assessment, you identified that the vendor is engaged with high profiled clients, and bad publicity can jeopardize your own brand.
Which is the BEST type of risk that defines this event?
What is the MOST critical output of the incident response process?
You are the CISO for an investment banking firm. The firm is using artificial intelligence (AI) to assist in approving clients for loans.
Which control is MOST important to protect AI products?
An auditor is reviewing the security classifications for a group of assets and finds that many of the assets are not correctly classified.
What should the auditor’s NEXT step be?
What are the common data hiding techniques used by criminals?
A CISO implements smart cards for credential management, and as a result has reduced costs associated with help desk operations supporting password resets. This demonstrates which of the following principles?
Which of the following represents the BEST method for obtaining business unit acceptance of security controls within an organization?
An example of professional unethical behavior is:
Which of the following is considered a project versus a managed process?
A CISO decides to analyze the IT infrastructure to ensure security solutions adhere to the concepts of how hardware and software is implemented and managed within the organization. Which of the following principles does this best demonstrate?
When should IT security project management be outsourced?
A stakeholder is a person or group:
Knowing the potential financial loss an organization is willing to suffer if a system fails is a determination of which of the following?
Which of the following represents the best method of ensuring business unit alignment with security program requirements?
Which of the following information may be found in table top exercises for incident response?
When selecting a security solution with reoccurring maintenance costs after the first year, the CISO should: (choose the BEST answer)
How often should the Statements of Standards for Attestation Engagements-16 (SSAE16)/International Standard on Assurance Engagements 3402 (ISAE3402) report of your vendors be reviewed?
A department within your company has proposed a third party vendor solution to address an urgent, critical business need. As the CISO you have been asked to accelerate screening of their security control claims. Which of the following vendor provided documents is BEST to make your decision:
Which of the following is MOST beneficial in determining an appropriate balance between uncontrolled innovation and excessive caution in an organization?
The company decides to release the application without remediating the high-risk vulnerabilities. Which of the following is the MOST likely reason for the company to release the application?
Which of the following is the MOST important component of any change management process?
Which of the following are not stakeholders of IT security projects?
An organization has a stated requirement to block certain traffic on networks. The implementation of controls will disrupt a manufacturing process and cause unacceptable delays, resulting in sever revenue disruptions. Which of the following is MOST likely to be responsible for accepting the risk until mitigating controls can be implemented?
Which business stakeholder is accountable for the integrity of a new information system?
Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?
The ultimate goal of an IT security projects is:
A newly appointed security officer finds data leakage software licenses that had never been used. The officer decides to implement a project to ensure it gets installed, but the project gets a great deal of resistance across the organization. Which of the following represents the MOST likely reason for this situation?
Acme Inc. has engaged a third party vendor to provide 99.999% up-time for their online web presence and had them contractually agree to this service level agreement. What type of risk tolerance is Acme exhibiting? (choose the BEST answer):
As the CISO for your company you are accountable for the protection of information resources commensurate with:
You are the CISO of a commercial social media organization. The leadership wants to rapidly create new methods of sharing customer data through creative linkages with mobile devices. You have voiced concern about privacy regulations but the velocity of the business is given priority. Which of the following BEST describes this organization?
Which of the following is the BEST indicator of a successful project?
The organization does not have the time to remediate the vulnerability; however it is critical to release the application. Which of the following needs to be further evaluated to help mitigate the risks?
This occurs when the quantity or quality of project deliverables is expanded from the original project plan.
The exposure factor of a threat to your organization is defined by?
A security manager regualrly checks work areas after buisness hours for security violations; such as unsecured files or unattended computers with active sessions. This activity BEST demonstrates what part of a security program?
When would it be more desirable to develop a set of decentralized security policies and procedures within an enterprise environment?
When a CISO considers delaying or not remediating system vulnerabilities which of the following are MOST important to take into account?
Payment Card Industry (PCI) compliance requirements are based on what criteria?
Which of the following BEST describes an international standard framework that is based on the security model Information Technology—Code of Practice for Information Security Management?
Which of the following international standards can be BEST used to define a Risk Management process in an organization?
Creating a secondary authentication process for network access would be an example of?
Which of the following is considered to be an IT governance framework and a supporting toolset that allows for managers to bridge the gap between control requirements, technical issues, and business risks?
When deploying an Intrusion Prevention System (IPS) the BEST way to get maximum protection from the system is to deploy it
A method to transfer risk is to:
A global health insurance company is concerned about protecting confidential information. Which of the following is of MOST concern to this organization?
The establishment of a formal risk management framework and system authorization program is essential. The LAST step of the system authorization process is:
The BEST organization to provide a comprehensive, independent and certifiable perspective on established security controls in an environment is
Which of the following is a critical operational component of an Incident Response Program (IRP)?
An organization has implemented a change management process for all changes to the IT production environment. This change management process follows best practices and is expected to help stabilize the availability and integrity of the organization’s IT environment. Which of the following can be used to measure the effectiveness of this newly implemented process:
What is the definition of Risk in Information Security?
The single most important consideration to make when developing your security program, policies, and processes is:
Which of the following is the MOST effective way to measure the effectiveness of security controls on a perimeter network?
Which of the following is the MOST important goal of risk management?
The effectiveness of social engineering penetration testing using phishing can be used as a Key Performance Indicator (KPI) for the effectiveness of an organization’s
Which of the following reports should you as an IT auditor use to check on compliance with a service level agreement’s requirement for uptime?
What role should the CISO play in properly scoping a PCI environment?
Which of the following represents the BEST reason for an organization to use the Control Objectives for Information and Related Technology (COBIT) as an Information Technology (IT) framework?
Which of the following is the MAIN reason to follow a formal risk management process in an organization that hosts and uses privately identifiable information (PII) as part of their business models and processes?
Which of the following set of processes is considered to be one of the cornerstone cycles of the International Organization for Standardization (ISO) 27001 standard?
Quantitative Risk Assessments have the following advantages over qualitative risk assessments:
Which of the following should be determined while defining risk management strategies?
Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?
The process for identifying, collecting, and producing digital information in support of legal proceedings is called
What type of attack requires the least amount of technical equipment and has the highest success rate?
The process of identifying and classifying assets is typically included in the
In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:
Which wireless encryption technology makes use of temporal keys?
You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?
Which of the following is a countermeasure to prevent unauthorized database access from web applications?
Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?
An anonymity network is a series of?
The process of creating a system which divides documents based on their security level to manage access to private data is known as
Which of the following is a symmetric encryption algorithm?
One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?
Which of the following is the MAIN security concern for public cloud computing?
Which of the following backup sites takes the longest recovery time?
What is the FIRST step in developing the vulnerability management program?
The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks
2.Scanning and enumeration
3.Maintaining Access
4.Reconnaissance
5.Gaining Access
A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?
An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?
The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?
Which of the following statements about Encapsulating Security Payload (ESP) is true?
While designing a secondary data center for your company what document needs to be analyzed to determine to how much should be spent on building the data center?
Physical security measures typically include which of the following components?
Your incident handling manager detects a virus attack in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the incident handling process will utilize the signature to resolve this incident?
Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?