New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following activities are performed by the 'Do' cycle component of PDCA (plan-docheck- act)?

Each correct answer represents a complete solution. Choose all that apply.

A.

It performs security awareness training.

B.

It operates the selected controls.

C.

It detects and responds to incidents properly.

D.

It determines controls and their objectives.

E.

It manages resources that are required to achieve a goal.

You work as an Information Security Manager for uCertify Inc. You are working on an asset management plan. Which of the following controls of the ISO 27000 standard deals with asset management?

A.

Control A.1

B.

Control A.8

C.

Control A.2

D.

Control A.7

Which of the following is not one of the objectives of risk analysis?

A.

Determining the risk that threats will become a reality

B.

Identifying assets and their value

C.

Removing the risks

D.

Determining vulnerabilities and threats

What does CRAMM stand for?

A.

Continuous Risk Analysis and Management Method

B.

CCTA Risk Analysis and Management Method

C.

Continuous Risk Analyzer and Manager Methodology

D.

CCTA Risk Analyzer and Manager Methodology

You are the project manager for a construction project. The project involves casting of a column in a very narrow space. Because of the lack of space, casting is highly dangerous. High technical skill will be required for casting that column. You decide to hire a local expert team for casting that column. Which of the following types of risk response are you following?

A.

Avoidance

B.

Transference

C.

Mitigation

D.

Acceptance

Which of the following can be protected by the RAID implementation?

A.

Switch failure

B.

Disk failure

C.

Network failure

D.

Host failure

Which of the following statements is related to residual risks?

A.

It can be considered as an indicator of threats coupled with vulnerability.

B.

It is the probabilistic risk before implementing all security measures.

C.

It is a weakness or lack of safeguard that can be exploited by a threat.

D.

It is the probabilistic risk after implementing all security measures.

Which of the following is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory?

A.

Ping of death

B.

Self-modifying code

C.

Heap overflow

D.

Buffer overflow

Which of the following is used to align and realign IT Services to changing business needs by identifying and implementing improvements to IT services?

A.

Business Impact Analysis (BIA)

B.

Continual Service Improvement (CSI)

C.

Recovery Point Objective (RPO)

D.

Business Continuity Plan (BCP)

John works as a Security Administrator for uCertify Inc. As per his past experience, he wants to make a policy stating that any hardware devices containing information about the organization should be destroyed properly before they are thrown. After applying this policy, John will be able to ensure that the information on the devices will not fall into the hands of unauthorized persons after properly discarding the devices.

Which of the following types of policies is John going to create?

A.

Due Care

B.

Privacy

C.

Disposal and destruction

D.

Security