1. The PRIMARY reason for using information security metrics is to:
A) achieve senior management commitment. B) ensure alignment with corporate requirements. C) adhere to legal and regulatory requirements. D) monitor the effectiveness of controls.
2. An information security team is investigating an alleged breach of an organization's network. Which of the following would be the BEST single source of evidence to review?
A) Intrusion detection system B) SIEM tool C) Antivirus software D) File integrity monitoring software
3. Which of the following is the -defense against distributed denial of service (DDoS) attacks?
A) Multiple and redundant paths B) Well-configured routers and firewalls C) Regular patching D) Intruder-detection lockout
4. Which of the following function is the MOST critical when initiating the removal of system access for terminated employees?
A) Human resources B) Legal C) Help desk D) Information security
5. After logging in to a web application, further password credentials are required at various application points. Which of the following is the PRIMARY reason for such an approach?
A) To ensure access is granted to the authorized person B) To enforce strong two-factor authentication C) To ensure session management variables are secure D) To implement single sign-on
Leave a comment