1. Which of the following will BEST help to proactively prevent the exploitation of vulnerabilities in operating system software?
A) Patch management B) Threat management C) Intrusion detection system D) Anti-virus software
2. An organization permits the storage and use of its critical and sensitive information on employee-owned smartphones. Which of the following is the BEST security control?
A) Requiring the backup of the organization's data by the user B) Establishing the authority to remote wipe C) Monitoring how often the smartphone is used D) Developing security awareness training
3. During which phase of an incident response process should corrective actions to the response procedure be considered and implemented?
A) Eradication B) Review C) Containment D) Identification
4. Employees in a large multinational organization frequently travel among various geographic locations. Which type of authorization policy BEST addresses this practice?
A) Multilevel B) Identity C) Role-based D) Discretionary
5. To ensure IT equipment meets organizational security standards, the MOST efficient approach is to:
A) assess security during equipment deployment. B) ensure compliance during user acceptance testing. C) assess the risks of all new equipment. D) develop an approved equipment list.
Leave a comment