1. Right Answer: B
Explanation: Network segmentation reduces the impact of traffic sniffing by limiting the amount of traffic that may be visible on any one network segment. Network segmentation would not mitigate the risk posed by denial of service (DoS) attacks, virus infections or IP address spoofing since each of these would be able to traverse network segments.
2. Right Answer: D
Explanation: Unavailability of Internet access would cause a business disruption. The other three objectives are secondary.
3. Right Answer: A
Explanation: The authentication process is broken because, although the session is valid, the application should reauthenticate when the input parameters are changed. The review provided valid employee IDs, and valid input was processed. The problem here is the lack of reauthentication when the input parameters are changed.Cross-site scripting is not the problem in this case since the attack is not transferred to any other user's browser to obtain the output. Structured query language(SQL) injection is not a problem since input is provided as a valid employee ID and no SQL queries are injected to provide the output.
4. Right Answer: C
Explanation: In the design phase, security checkpoints are defined and a test plan is developed. The testing phase is too late since the system has already been developed and is in production testing. In the initiation phase, the basic security objective of the project is acknowledged. Development is the coding phase and is too late to consider test plans.
5. Right Answer: C
Explanation: Regular audit exercise can spot any gap in the information security compliance. Service level monitoring can only pinpoint operational issues in the organization's operational environment. Penetration testing can identify security vulnerability but cannot ensure information compliance Training can increase users' awareness on the information security policy, but is not more effective than auditing.