1. An organization performed a risk analysis and found a large number of assets with low-impact vulnerabilities. The NEXT action of the information security manager should be to:
A) determine appropriate countermeasures. B) transfer the risk to a third party. C) report to management. D) quantify the aggregated risk.
2. What is the PRIMARY goal of an incident management program?
A) Minimize impact to the organization. B) Contain the incident. C) Identify root cause. D) Communicate to external entities.
3. An organization has determined that one of its web servers has been compromised. Which of the following actions should be taken to preserve the evidence of the intrusion for forensic analysis and potential litigation?
A) Reboot the server in a secure area to search for digital evidence. B) Unplug the server from the power. C) Restrict physical and logical access to the server. D) Run analysis tools to detect the source of the intrusion.
4. Which of the following is the GREATEST potential exposure created by outsourcing to an application service provider?
A) Denial of service attacks B) Combining incompatible duties C) Mixing of data D) Lack of technical expertise
5. Which of the following BEST indicates an effective vulnerability management program?
A) Risks are managed within acceptable limits. B) Threats are identified accurately. C) Vulnerabilities are managed proactively. D) Vulnerabilities are reported in a timely manner.
Leave a comment