Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on information security?

A.

A large increase in remote workers operating in insecure premises.

B.

Additional physical security requirements at data centres and corporate headquarters.

C.

Increased demand on service desks as users need additional tools such as VPNs.

D.

An upsurge in activity by attackers seeking vulnerabilities caused by operational changes.

Which standard deals with the implementation of business continuity?

A.

ISO/IEC 27001

B.

COBIT

C.

IS0223G1.

D.

BS5750.

What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?

A.

ISO/IEC 27001.

B.

Qualitative.

C.

CPNI.

D.

Quantitative

In order to better improve the security culture within an organisation with a top down approach, which of the following actions at board level is the MOST effective?

A.

Appointment of a Chief Information Security Officer (CISO).

B.

Purchasing all senior executives personal firewalls.

C.

Adopting an organisation wide "clear desk" policy.

D.

Developing a security awareness e-learning course.

Which of the following types of organisation could be considered the MOST at risk from the theft of electronic based credit card data?

A.

Online retailer.

B.

Traditional market trader.

C.

Mail delivery business.

D.

Agricultural producer.

Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.

A.

Cryptographic Statement.

B.

Security Policy Framework.

C.

Acceptable Usage Policy.

D.

Business Continuity Plan.

In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?

A.

The 'need to known principle.

B.

Verification of visitor's ID

C.

Appropriate behaviours.

D.

Access denial measures

What physical security control would be used to broadcast false emanations to mask the presence of true electromagentic emanations from genuine computing equipment?

A.

Faraday cage.

B.

Unshielded cabling.

C.

Copper infused windows.

D.

White noise generation.

What type of diagram used in application threat modeling includes malicious users as well as descriptions like mitigates and threatens?

A.

Threat trees.

B.

STRIDE charts.

C.

Misuse case diagrams.

D.

DREAD diagrams.

Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?

A.

Quality Assurance and Control

B.

Dynamic verification.

C.

Static verification.

D.

Source code analysis.