You work as an Information Security Manager for uCertify Inc. The company has made a contract with a third party software company to make a software program for personal use. You have been assigned the task to share the organization's personal requirements regarding the tool to the third party. Which of the following documents should be first signed by the third party?
Which of the following plans provides measures and capabilities for recovering a major application or general support system?
Which of the following is the designing phase of the ISMS?
Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?
You work as an Information Security Manager for uCertify Inc. You have been assigned the task to create the documentation on control A.7.2 of the ISO standard. Which of the following is the chief concern of control A.7.2?
Which of the following persons is responsible for testing and verifying whether the security policy is properly implemented, and the derived security solutions are adequate or not?
Which of the following are the uses of cryptography as defined in a policy document?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Security Administrator for uCertify Inc. You need to make a documentation to provide ongoing education and awareness training of disciplinary actions of your company. What are the primary reasons to create this documentation?
Each correct answer represents a complete solution. Choose all that apply.
John works as an IT Technician for uCertify Inc. One morning, John receives an e-mail from the company's Manager asking him to provide his logon ID and password, but the company policy restricts users from disclosing their logon IDs and passwords. Which type of possible attack is this?
Which of the following are the factors that determine the degree to which the Return on Investment overstates the economic value?
Each correct answer represents a complete solution. Choose all that apply.
You work as the Network Security Administrator for uCertify Inc. You are responsible for protecting your network from unauthorized access from both inside and outside the organization. For outside attacks, you have installed a number of security tools that protect your network. For internal security, employees are using passwords more than 8 characters; however, a few of them having the same designation often exchange their passwords, making it possible for others to access their accounts.
There is already a policy to stop this practice, but still employees are doing so. Now, you want to stop this and ensure that this never happens again. Which of the following will be the best step to stop this practice?
Which of the following is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients?
Which of the following tasks are performed by Information Security Management?
Each correct answer represents a complete solution. Choose all that apply.
Single Loss Expectancy (SLE) represents an organization's loss from a single threat. Which of the following formulas best describes the Single Loss Expectancy (SLE)?
You work as an Information Security Manager for uCertify Inc. You are working on communication and organization management. You need to create the documentation on change management.
Which of the following are the main objectives of change management?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following international information security standards is concerned with anticipating and responding to information security breaches?
Which of the following are the two methods that are commonly used for applying mandatory access control?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following individuals calculates the recovery time and cost estimates while performing a business impact analysis (BIA)?
Which of the following activities are performed by the 'Do' cycle component of PDCA (plan-docheck- act)?
Each correct answer represents a complete solution. Choose all that apply.
David works as the Manager for Tech Mart Inc. An incident had occurred ten months ago due to which the company suffered too much losses. David has been assigned the task to submit a report on the losses incurred by the company in a year. Which of the following should David calculate in order to
submit the report containing annualized loss expectancy?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements are true about Regulation of Investigatory Powers Act 2000?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following paragraphs of the Turnbull Report stated that a company's internal control system encompasses the policies, processes, tasks, behaviors, and other aspects of the company?
Mark works as a Network Security Administrator for uCertify Inc. He has installed IDS for matching incoming packets against known attacks. Which of the following types of intrusion detection techniques is being used?
Which of the following types of cyberstalking damages the reputation of their victim and turns other people against them by setting up their own Websites, blogs, or user pages for this purpose?
Which of the following is a list of specific actions being taken to deal with specific risks associated with the threats?
Which of the following creates policies, plans, and procedures to minimize the impact of risks to the organizational processes?
You work as the Network Administrator for a defense contractor. Your company works with sensitive materials and all IT personnel have at least a secret level clearance. You are still concerned that one individual could perhaps compromise the network (intentionally or unintentionally) by setting up improper or unauthorized remote access. What is the best way to avoid this problem?
Sam works as the Chief Information Security Officer for Blue Well Inc. There are a number of teams for the security purposes. Which of the following are the types of teams of which Sam can be a part of?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following policies defines the acceptable methods of remotely connecting a system to the internal network?
David works as the Chief Information Security Officer for uCertify Inc. Which of the following are the responsibilities that should be handled by David?
Each correct answer represents a complete solution. Choose all that apply.
Mark works as a Software Developer for TechNet Inc. He has recently been fired, as he was caught doing some illegal work in the organization. Before leaving the organization, he decided to retaliate against the organization. He deleted some of the system files and made some changes in the registry files created by him. Which of the following types of attacks has Mark performed?
You work as an Information Security Manager for uCertify Inc. You are working on a software asset management plan to provide backup for Active Directory. Which of the following data is required to be backed up for this purpose?
Which of the following policies is a set of rules applied by the owner/manager of a network, Website or large computer system that restrict the ways in which the network site or system may be used?
Mark works as a System Administrator for uCertify Inc. He is responsible for securing the network of the organization. He is configuring some of the advanced features of the Windows firewall so that he can block the client machine from responding to pings. Which of the following advanced setting types should Mark change for accomplishing the task?
You work as an Information Security Officer. You are working on an asset management plan. You need to assign ownership of some assets to an employee. You are making a documentation to explain the responsibilities of an owner of the business asset. Which of the following areas should you include in your documentation?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Administrator for uCertify Inc. You are responsible for selecting the access control method that will be used for kiosk system software. Your manager wants to have full access to all information about all categories, but the visitors can access only general information about the organization. Which of the following types of access controls is suitable to accomplish this task?
You work as an Information Security Manager for uCertify Inc. The company is releasing the documentation about a software product. Which of the following documents is required by the company to protect it against a libel action if information is corrupted, lost, and destroyed?
David works as the Network Administrator for Blue Well Inc. He has been asked to perform risk analysis. He decides to perform it by using CRAMM. The CEO of the company wants to know the stronger points of CRAMM that is going to be used by David. Which of the following points will David tell the CEO of the organization?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Security Administrator for uCertify Inc. You need to define security controls regarding the network of the organization. Which of the following information security standards deals with the management of technical security controls in systems and networks?
Which of the following Acts, enacted in the United States, amends Civil Rights Act of 1964, providing technical changes affecting the length of time allowed to challenge unlawful seniority provisions, to sue the federal government for discrimination and to bring age discrimination claims?
You work as an Information Security Manager for uCertify Inc. You need to make the documentation on change management. What are the advantages of using change management?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following methods can be helpful to eliminate social engineering threat?
Each correct answer represents a complete solution. Choose three.
For which of the following can risk analysis be used?
Which of the following is the correct formula of annualized loss expectancy?
Which of the following paragraphs of the Turnbull Report stated that a company's internal control system encompasses the policies, processes, tasks, behaviors, and other aspects of the company?
You work as a Security Administrator for uCertify Inc. You have been assigned the task to provide a solution based on high reliability combined with high performance. Which of the following will you use to accomplish the task?
A business impact analysis should be reviewed at a minimum annually but there are a few events in which it should be reviewed more frequently. Which of the following are these events?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Network Auditor for Net Perfect Inc. The company has a Windows-based network. You need to audit the network of the company. You need to plan the audit process to minimize the audit risk.
What steps will you take to minimize the possibility of audit risk?
Mark works as a Webmaster for Infonet Inc. He sets up an e-commerce site. He wants to accept online payments through credit cards on this site. He wants the credit card numbers to be encrypted. What will Mark do to accomplish the task?
You work as an Information Security Manager for uCertify Inc. You have been assigned the task to create the documentation on control A.7.1.3. Which of the following is the chief concern of control A.7.1.3?
Peter works as a Security Administrator for SecureEnet Inc. He observes that the database server of the company has been compromised and the data is stolen. Peter immediately wants to report this crime to the law enforcement authorities. Which of the following organizations looks after computer crime investigations in the United States?
You are consulting with a small budget conscious accounting firm. Each accountant keeps individual records on their PC and checks them in and out of a server. They are concerned about losing data should the server hard drive crash. Which of the following RAID levels would you recommend?
Which of the following is NOT a module of FaultTree+?
What does CRAMM stand for?
You have just taken control over network administration services for a sales and marketing firm. The sales staff (consisting of 10 people) rely heavily on both phone and internet connections for business. You notice that the sales staff has a single T1 line handling their phone and internet connections. Which of the following would be the best suggestion for improving this situation?
Which of the following are the limitations of Redundant Array of Inexpensive Disks (RAID)?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is used to shift the impact of a threat to a third party, together with the ownership of the response?
Which of the following is NOT a type of FMEA?
Which of the following activities are performed by the 'Do' cycle component of PDCA (plan-docheck- act)?
Each correct answer represents a complete solution. Choose all that apply.
Single Loss Expectancy (SLE) represents an organization's loss from a single threat. Which of the following formulas best describes the Single Loss Expectancy (SLE)?
Which of the following states that a user should never be given more privileges than are required to carry out a task?
Which of the following are process elements for remote diagnostics?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are the purposes of security awareness, training, and education?
Each correct answer represents a complete solution. Choose all that apply.
You work as an Information Security Manager for uCertify Inc. You need to create the documentation on information security management system (ISMS). Which of the following is the governing principle behind ISMS?
You work as a Security Administrator for uCertify Inc. You have installed ten separate applications for your employees to work. All the applications require users to log in before working on them; however, this takes a lot of time. Therefore, you decide to use SSO to resolve this issue. Which of the following are the other benefits of Single Sign-On (SSO)?
Each correct answer represents a complete solution. Choose all that apply.
The usage of pre-numbered forms for initiating a transaction is an example of which of the following types of control?
Which of the following protects original works of authorship including literary, dramatic, musical, artistic, and other intellectual works?