1. Reevaluation of risk is MOST critical when there is:
A) a change in security policy. B) resistance to the implementation of mitigating controls. C) a change in the threat landscape. D) a management request for updated security reports.
2. An information security manager finds that a soon-to-be deployed online application will increase risk beyond acceptable levels, and necessary controls have not been included. Which of the following is the BEST course of action for the information security manager?
A) Present a business case for additional controls to senior management. B) Instruct IT to deploy controls based on urgent business needs. C) Solicit bids for compensating control products. D) Recommend a different application.
3. Which of the following is the GREATEST risk of single sign-on?
A) It is a single point of failure for an enterprise access control process. B) Password carelessness by one user may render the entire infrastructure vulnerable. C) Integration of single sign-on with the rest of the infrastructure is complicated. D) One administrator maintains the single sign-on solutions without segregation of duty.
4. Which of the following is the MOST important reason for performing a risk analysis?
A) Assigning the appropriate level of protection B) Identifying critical information assets C) Identifying and eliminating threats D) Promoting increased security awareness in the organization
5. Deciding the level of protection a particular asset should be given in BEST determined by:
A) a threat assessment. B) a vulnerability assessment. C) a risk analysis. D) corporate risk appetite.
Leave a comment