Topic 1: Governance (Policy, Legal & Compliance)
What is the definition of Risk in Information Security?
A.
Risk = Probability x Impact
B.
Risk = Threat x Probability
C.
Risk = Financial Impact x Probability
D.
Risk = Impact x Threat
Risk = Probability x Impact
The framework that helps to define a minimum standard of protection that business stakeholders must attempt to achieve is referred to as a standard of:
A.
Due Protection
B.
Due Care
C.
Due Compromise
D.
Due process
Due Care
A security officer wants to implement a vulnerability scanning program. The officer is uncertain of the state of vulnerability resiliency within the organization’s large IT infrastructure. What would be the BEST approach to minimize scan data output while retaining a realistic view of system vulnerability?
A.
Scan a representative sample of systems
B.
Perform the scans only during off-business hours
C.
Decrease the vulnerabilities within the scan tool settings
D.
Filter the scan output so only pertinent data is analyzed
Scan a representative sample of systems
Who is responsible for securing networks during a security incident?
A.
Chief Information Security Officer (CISO)
B.
Security Operations Center (SO
C.
Disaster Recovery (DR) manager
D.
Incident Response Team (IRT)
Incident Response Team (IRT)
Which of the following is the MOST important benefit of an effective security governance process?
A.
Reduction of liability and overall risk to the organization
B.
Better vendor management
C.
Reduction of security breaches
D.
Senior management participation in the incident response process
Reduction of liability and overall risk to the organization
Which of the following international standards can be BEST used to define a Risk Management process in an organization?
A.
National Institute for Standards and Technology 800-50 (NIST 800-50)
B.
International Organization for Standardizations – 27005 (ISO-27005)
C.
Payment Card Industry Data Security Standards (PCI-DSS)
D.
International Organization for Standardizations – 27004 (ISO-27004)
International Organization for Standardizations – 27005 (ISO-27005)
Assigning the role and responsibility of Information Assurance to a dedicated and independent security group is an example of:
A.
Detective Controls
B.
Proactive Controls
C.
Preemptive Controls
D.
Organizational Controls
Organizational Controls
Which of the following set of processes is considered to be one of the cornerstone cycles of the International Organization for Standardization (ISO) 27001 standard?
A.
Plan-Check-Do-Act
B.
Plan-Do-Check-Act
C.
Plan-Select-Implement-Evaluate
D.
SCORE (Security Consensus Operational Readiness Evaluation)
Plan-Do-Check-Act
To have accurate and effective information security policies how often should the CISO review the organization policies?
A.
Every 6 months
B.
Quarterly
C.
Before an audit
D.
At least once a year
At least once a year
As a new CISO at a large healthcare company you are told that everyone has to badge in to get in the building. Below your office window you notice a door that is normally propped open during the day for groups of people to take breaks outside. Upon looking closer you see there is no badge reader. What should you do?
A.
Nothing, this falls outside your area of influence.
B.
Close and chain the door shut and send a company-wide memo banning the practice.
C.
Have a risk assessment performed.
D.
Post a guard at the door to maintain physical security
Have a risk assessment performed.
Page 10 out of 45 Pages |
Previous |