1. Which of the following would be MOST helpful when justifying the funding required for a compensating control?
A) Threat assessment B) Business impact analysis C) Business case D) Risk analysis
2. Which of the following BEST reduces the likelihood of leakage of private information via email?
A) Email encryption B) User awareness training C) Strong user authentication protocols D) Prohibition on the personal use of email
3. Once a suite of security controls has been successfully implemented for an organization's business units, it is MOST important for the information security manager to:
A) ensure the controls are regularly tested for ongoing effectiveness. B) hand over the controls to the relevant business owners. C) prepare to adapt the controls for future system upgrades. D) perform testing to compare control performance against industry levels.
4. What should be an organization's MAIN concern when evaluating an Infrastructure as a Service (IaaS) cloud computing model for an e-Commerce application?
A) Availability of provider's services B) Internal about requirements C) Where the application resides D) Application ownership
5. Which of the following would be MOST important to include in a bring your own device (BYOD) policy with regard to lost or stolen devices? The need for employees to:
A) initiate the company's incident reporting process. B) seek advice from the mobile service provider. C) notify local law enforcement. D) request a remote wipe of the device.
Leave a comment