1. An organization shares customer information across its globally dispersed branches. Which of the following should be the GREATEST concern to information security management?
A) Cross-cultural differences between branches B) Conflicting data protection regulations C) Insecure wide area networks (WANs) D) Decentralization of information security
2. Which of the following is the PRIMARY benefit of implementing a maturity model for information security management?
A) Information security management costs will be optimized. B) Information security strategy will be in line with industry best practice. C) Gaps between current and desirable levels will be addressed. D) Staff awareness of information security compliance will be promoted.
3. Which of the following provides the MOST comprehensive understanding of an organization's information security posture?
A) Risk management metrics B) External audit findings C) Results of vulnerability assessments D) The organization's security incident trends
4. Most security vulnerabilities in software exit because:
A) security features are not tested adequately. B) software has undocumented features. C) security is not properly designed. D) software is developed without adherence to standards.
5. Which of the following is a potential indicator of inappropriate Internet use by staff?
A) Increased help desk calls for password resets B) Reduced number of pings on firewalls C) Increased reports of slow system performance D) Increased number of weakness from vulnerability scans
Leave a comment