1. Which of the following would be MOST helpful to the information security manager tasked with enforcing enhanced password standards?
A) Conducting password strength testing B) Reeducating end users on creating strong complex passwords C) Implementing a centralized identity management system D) Implementing technical password controls to include strong complexity
2. Which of the following is the MOST practical control that an organization can implement to prevent unauthorized downloading of data to universal serial bus (USB) storage devices?
A) Two-factor authentication B) Restrict drive usage C) Strong encryption D) Disciplinary action
3. Which of the following is the BEST method to determine whether an information security program meets an organization's business objectives?
A) Implement performance measures. B) Review against international security standards. C) Perform a business impact analysis (BIA). D) Conduct an annual enterprise-wide security evaluation.
4. What is the BEST course of action when an information security manager finds an external service provider has not implemented adequate controls for safeguarding the organization's critical data?
A) Assess the impact of the control gap. B) Initiate contract renegotiations. C) Purchase additional insurance. D) Conduct a controls audit of the provider.
5. A PRIMARY purpose of creating security policies is to:
A) implement management's governance strategy. B) establish the way security tasks should be executed. C) communicate management's security expectations. D) define allowable security boundaries.
Leave a comment