1. An office recently completed digitizing all its paper records. Joe,the data custodian,has been tasked with the disposal of the paper files,which include: Intellectual property Payroll records Financial information Drug screening results Which of the following is the BEST way to dispose of these items?
A) Schredding B) Pulping C) Deidentifying D) Recycling
2. An organization electronically processes sensitive data within a controlled facility. The Chief Information Security Officer (CISO) wants to limit emissions from emanating from the facility. Which of the following mitigates this risk?
A) Upgrading facility cabling to a higher standard of protected cabling to reduce the likelihood of emission spillage B) Hardening the facility through the use of secure cabinetry to block emissions C) Hardening the facility with a Faraday cage to contain emissions produced from data processing D) Employing security guards to ensure unauthorized personnel remain outside of the facility
3. An organization employee resigns without giving adequate notice. The following day,it is determined that the employee is still in possession of several company- owned mobile devices. Which of the following could have reduced the risk of this occurring? (Choose two.)(Select 2answers)
A) Proper offboarding procedures B) Acceptable use policies C) Non-disclosure agreements D) Exit interviews E) Background checks F) Separation of duties
4. An organization finds that most help desk calls are regarding account lockout due to a variety of applications running on different systems. Management is looking for a solution to reduce the number of account lockouts while improving security. Which of the following is the BEST solution for this organization?
A) Create multiple application accounts for each user. B) Provide secure tokens. C) Implement SSO. D) Utilize role-based access control.
5. An organization has air gapped a critical system. Which of the following BEST describes the type of attacks that are prevented by this security measure?
A) Attacks from another local network segment B) Attacks exploiting USB drives and removable media C) Attacks that spy on leaked emanations or signals D) Attacks that involve physical intrusion or theft
Leave a comment