1. Which of the following architectures for e-business BEST ensures high availability?
A) Availability of an adjacent hot site and a standby server with mirrored copies of critical data B) Intelligent middleware to direct transactions from a downed system to an alternative C) A single point of entry allowing transactions to be received and processed quickly D) Automatic failover to the web site of another e-business that meets the user's needs
2. A business case for investment in an information security management infrastructure MUST include:
A) evidence that the proposed infrastructure is certified. B) specifics on the security applications needed. C) data management methods currently in use. D) impact of noncompliance with applicable standards.
3. An organization that has outsourced its incident management capabilities just discovered a significant privacy breach by an unknown attacker. Which of the following is the MOST important action of the information security manager?
A) Follow the outsourcer's response plan. B) Alert the appropriate law enforcement authorities. C) Refer to the organization's response plan. D) Notify the outsourcer of the privacy breach.
4. Which of the following threats is prevented by using token-based authentication?
A) Password sniffing attack on the network B) Denial of service attack over the network C) Main-in-the middle attack on the client D) Session eavesdropping attack on the network
5. What of the following is MOST important to include in an information security policy?
A) Maturity levels B) Best practices C) Management objectives D) Baselines
Leave a comment