SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:
Which of the following statements about Encapsulating Security Payload (ESP) is true?
One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?
Which wireless encryption technology makes use of temporal keys?
Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?
Which of the following is a countermeasure to prevent unauthorized database access from web applications?
Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?
Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?
The process of identifying and classifying assets is typically included in the
In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:
An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?
Which of the following represents the BEST method for obtaining business unit acceptance of security controls within an organization?
Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?
When operating under severe budget constraints a CISO will have to be creative to maintain a strong security organization. Which example below is the MOST creative way to maintain a strong security posture during these difficult times?
When selecting a security solution with reoccurring maintenance costs after the first year (choose the BEST answer):
The company decides to release the application without remediating the high-risk vulnerabilities. Which of the following is the MOST likely reason for the company to release the application?
An application vulnerability assessment has identified a security flaw in an application. This is a flaw that was previously identified and remediated on a prior release of the application. Which of the following is MOST likely the reason for this recurring issue?
Which of the following represents the best method of ensuring business unit alignment with security program requirements?
Your company has a “no right to privacy” notice on all logon screens for your information systems and users sign an Acceptable Use Policy informing them of this condition. A peer group member and friend comes to you and requests access to one of her employee’s email account. What should you do? (choose the BEST answer):
Which of the following best summarizes the primary goal of a security program?
When is an application security development project complete?
When entering into a third party vendor agreement for security services, at what point in the process is it BEST to understand and validate the security posture and compliance level of the vendor?
A CISO implements smart cards for credential management, and as a result has reduced costs associated with help desk operations supporting password resets. This demonstrates which of the following principles?
The formal certification and accreditation process has four primary steps, what are they?
The Annualized Loss Expectancy (Before) minus Annualized Loss Expectancy (After) minus Annual Safeguard Cost is the formula for determining:
The rate of change in technology increases the importance of:
Which of the following terms is used to describe countermeasures implemented to minimize risks to physical
property, information, and computing systems?
File Integrity Monitoring (FIM) is considered a
As the Chief Information Security Officer, you are performing an assessment of security posture to understand
what your Defense-in-Depth capabilities are. Which network security technology examines network traffic flows
to detect and actively stop vulnerability exploits and attacks?
Which of the following provides an independent assessment of a vendor’s internal security controls and overall posture?
SCENARIO: Critical servers show signs of erratic behavior within your organization’s intranet. Initial information indicates the systems are under attack from an outside entity. As the Chief Information Security Officer (CISO), you decide to deploy the Incident Response Team (IRT) to determine the details of this incident and take action according to the information available to the team.
In what phase of the response will the team extract information from the affected systems without altering original data?
Which of the following is the MOST logical method of deploying security controls within an organization?
Which of the following best describes the sensors designed to project and detect a light beam across an area?
Access Control lists (ACLs), Firewalls, and Intrusion Prevention Systems are examples of
Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and
uses the special card in order to access the restricted area of the target company. Just as the employee opens
the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so
that he can enter. What is the best way to undermine the social engineering activity of tailgating?
During the course of a risk analysis your IT auditor identified threats and potential impacts. Next, your IT auditor should:
An IT auditor has recently discovered that because of a shortage of skilled operations personnel, the security administrator has agreed to work one late night shift a week as the senior computer operator. The most appropriate course of action for the IT auditor is to:
You work as a project manager for TYU project. You are planning for risk mitigation. You need to quickly identify high-level risks that will need a more in-depth analysis. Which of the following activities will help you in this?
Which of the following is a term related to risk management that represents the estimated frequency at which a threat is expected to transpire?
The implementation of anti-malware and anti-phishing controls on centralized email servers is an example of what type of security control?
At which point should the identity access management team be notified of the termination of an employee?
The risk found after a control has been fully implemented is called:
The CIO of an organization has decided to assign the responsibility of internal IT audit to the IT team. This is consider a bad practice MAINLY because
Which of the following is the MOST effective way to measure the effectiveness of security controls on a perimeter network?
A recent audit has identified a few control exceptions and is recommending the implementation of technology and processes to address the finding. Which of the following is the MOST likely reason for the organization to reject the implementation of the recommended technology and processes?
Which of the following is a benefit of a risk-based approach to audit planning?
Which of the following is the MOST important reason to measure the effectiveness of an Information Security Management System (ISMS)?
As the Risk Manager of an organization, you are task with managing vendor risk assessments. During the assessment, you identified that the vendor is engaged with high profiled clients, and bad publicity can jeopardize your own brand.
Which is the BEST type of risk that defines this event?
Which of the following is considered the MOST effective tool against social engineering?
When choosing a risk mitigation method what is the MOST important factor?
A security manager regualrly checks work areas after buisness hours for security violations; such as unsecured files or unattended computers with active sessions. This activity BEST demonstrates what part of a security program?
Information security policies should be reviewed:
The success of the Chief Information Security Officer is MOST dependent upon:
An organization licenses and uses personal information for business operations, and a server containing that information has been compromised. What kind of law would require notifying the owner or licensee of this incident?
What is a difference from the list below between quantitative and qualitative Risk Assessment?
A Security Operations Centre (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen and the database server was disconnected. Who must be informed of this incident?
When briefing senior management on the creation of a governance process, the MOST important aspect should be:
When managing the security architecture for your company you must consider:
Which of the following are the MOST important factors for proactively determining system vulnerabilities?