1. Following a risk assessment, new countermeasures have been approved by management. Which of the following should be performed NEXT?
A) Develop an implementation strategy. B) Schedule the target end date for implementation activities. C) Budget the total cost of implementation activities. D) Calculate the residual risk for each countermeasure.
2. Which of the following would BEST assist an IS manager in gaining strategic support from executive management?
A) Annual report of security incidents within the organization B) Research on trends in global information security breaches C) Rating of the organization's security, based on international standards D) Risk analysis specific to the organization
3. An emergency change was made to an IT system as a result of a failure. Which of the following should be of GREATEST concern to the organization's information security manager?
A) The change did not include a proper assessment of risk. B) Documentation of the change was made after implementation. C) The information security manager did not review the change prior to implementation. D) The operations team implemented the change without regression testing.
4. The PRIMARY advantage of single sign-on (SSO) is that it will:
A) support multiple authentication mechanisms. B) increase the security related applications. C) strengthen user password. D) increase efficiency of access management.
5. Which of the following is the MOST important reason for performing vulnerability assessments periodically?
A) Management requires regular reports. B) The environment changes constantly. C) Technology risks must be mitigated. D) The current threat levels are being assessed.
Leave a comment