1. A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?
A) Authority of the subscriber to approve access to its data B) Right of the subscriber to conduct onsite audits of the vendor C) Escrow of software code with conditions for code release D) Comingling of subscribers' data on the same physical server
2. Which of the following is the BEST method to protect consumer private information for an online public website?
A) Encrypt consumer's data in transit and at rest. B) Apply a masking policy to the consumer data. C) Use secure encrypted transport layer. D) Apply strong authentication to online accounts.
3. Failure to include information security requirements within the build/buy decision would MOST likely result in the need for:
A) compensating controls in the operational environment. B) commercial product compliance with corporate standards. C) more stringent source programming standards. D) security scanning of operational platforms.
4. A business impact analysis should be periodically executed PRIMARILY to:
A) validate vulnerabilities on environmental changes. B) analyze the importance of assets. C) verify the effectiveness of controls. D) check compliance with regulations.
5. The GREATEST benefit resulting from well-documented information security procedures is that they:
A) ensure that security policies are consistently applied. B) ensure that critical processes can be followed by temporary staff. C) facilitate security training of new staff. D) provide a basis for auditing security practices.
Leave a comment