1. During an information security audit, it was determined that IT staff did not follow the established standard when configuring and managing IT systems. Which of the following is the BEST way to prevent future occurrences?
A) Updating configuration baselines to allow exceptions B) Conducting periodic vulnerability scanning C) Providing annual information security awareness training D) Implementing a strict change control process
2. Which of the following should be the PRIMARY focus of a post-incident review following a successful response to a cybersecurity incident?
A) Which control failures contributed to the incident B) How incident response processes were executed C) What attack vectors were utilized D) When business operations were restored
3. An organization has decided to conduct a postmortem analysis after experiencing a loss from an information security attack. The PRIMARY purpose of this analysis should be to:
A) prepare for criminal prosecution. B) document lessons learned. C) evaluate the impact. D) update information security policies.
4. Which of the following is the MOST important reason for performing a cost-benefit analysis when implementing a security control?
A) To present a realistic information security budget B) To ensure that benefits are aligned with business strategies C) To ensure that the mitigation effort does not exceed the asset value D) To justify information security program activities
5. When developing a new system, detailed information security functionality should FIRST be addressed:
A) as part of prototyping. B) during the system design phase. C) when system requirements are defined. D) as part of application development.
Leave a comment