What type of diagram used in application threat modeling includes malicious users as well as descriptions like mitigates and threatens?
Why might the reporting of security incidents that involve personal data differ from other types of security incident?
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
What term refers to the shared set of values within an organisation that determine how people are expected to behave in regard to information security?
One traditional use of a SIEM appliance is to monitor for exceptions received via syslog.
What system from the following does NOT natively support syslog events?
James is working with a software programme that completely obfuscates the entire source code, often in the form of a binary executable making it difficult to inspect, manipulate or reverse engineer the original source code.
What type of software programme is this?
How might the effectiveness of a security awareness program be effectively measured?
1) Employees are required to take an online multiple choice exam on security principles.
2) Employees are tested with social engineering techniques by an approved penetration tester.
3) Employees practice ethical hacking techniques on organisation systems.
4) No security vulnerabilities are reported during an audit.
5) Open source intelligence gathering is undertaken on staff social media profiles.
Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?
1. Intellectual Property Rights.
2. Protection of Organisational Records
3. Forensic recovery of data.
4. Data Deduplication.
5. Data Protection & Privacy.
What type of attack attempts to exploit the trust relationship between a user client based browser and server based websites forcing the submission of an authenticated request to a third party site?
What type of attack could directly affect the confidentiality of an unencrypted VoIP network?
When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.
In a virtualised cloud environment, what component is responsible for the secure separation between guest machines?
When an organisation decides to operate on the public cloud, what does it lose?
For which security-related reason SHOULD staff monitoring critical CCTV systems be rotated regularly during each work session?
When undertaking disaster recovery planning, which of the following would NEVER be considered a "natural" disaster?
When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?
Which three of the following characteristics form the AAA Triad in Information Security?
1. Authentication
2. Availability
3. Accounting
4. Asymmetry
5. Authorisation
Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?
Geoff wants to ensure the application of consistent security settings to devices used throughout his organisation whether as part of a mobile computing or a BYOD approach.
What technology would be MOST beneficial to his organisation?
Which type of facility is enabled by a contract with an alternative data processing facility which will provide HVAC, power and communications infrastructure as well computing hardware and a duplication of organisations existing "live" data?
Which of the following statements relating to digital signatures is TRUE?
Why have MOST European countries developed specific legislation that permits police and security services to monitor communications traffic for specific purposes, such as the detection of crime?
What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?
Which of the following is NOT an information security specific vulnerability?
Which of the following international standards deals with the retention of records?
In business continuity (BC) terms, what is the name of the individual responsible for recording all pertinent information associated with a BC exercise or real plan invocation?
What Is the PRIMARY reason for organisations obtaining outsourced managed security services?
Which types of organisations are likely to be the target of DDoS attacks?