Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Refer to the information below to answer the question.

An organization has hired an information security officer to lead their security department. The officer has adequate people resources but is lacking the other necessary components to have an effective security program. There are numerous initiatives requiring security involvement.

The effectiveness of the security program can PRIMARILY be measured through

A.

audit findings.

B.

risk elimination.

C.

audit requirements.

D.

customer satisfaction.

Which of the following is the MAIN goal of a data retention policy?

A.

Ensure that data is destroyed properly.

B.

Ensure that data recovery can be done on the datA.

C.

Ensure the integrity and availability of data for a predetermined amount of time.

D.

Ensure the integrity and confidentiality of data for a predetermined amount of time.

When dealing with compliance with the Payment Card Industry-Data Security Standard (PCI-DSS), an organization that shares card holder information with a service provider MUST do which of the following?

A.

Perform a service provider PCI-DSS assessment on a yearly basis.

B.

Validate the service provider's PCI-DSS compliance status on a regular basis.

C.

Validate that the service providers security policies are in alignment with those of the organization.

D.

Ensure that the service provider updates and tests its Disaster Recovery Plan (DRP) on a yearly basis.

Refer to the information below to answer the question.

An organization experiencing a negative financial impact is forced to reduce budgets and the number of Information Technology (IT) operations staff performing basic logical access security administration functions. Security processes have been tightly integrated into normal IT operations and are not separate and distinct roles.

Which of the following will be the PRIMARY security concern as staff is released from the organization?

A.

Inadequate IT support

B.

Loss of data and separation of duties

C.

Undocumented security controls

D.

Additional responsibilities for remaining staff

An organization publishes and periodically updates its employee policies in a file on their intranet. Which of the following is a PRIMARY security concern?

A.

Availability

B.

Confidentiality

C.

Integrity

D.

Ownership

Refer to the information below to answer the question.

A security practitioner detects client-based attacks on the organization’s network. A plan will be necessary to address these concerns.

What MUST the plan include in order to reduce client-side exploitation?

A.

Approved web browsers

B.

Network firewall procedures

C.

Proxy configuration

D.

Employee education

A large bank deploys hardware tokens to all customers that use their online banking system. The token generates and displays a six digit numeric password every 60 seconds. The customers must log into their bank accounts using this numeric password. This is an example of

A.

asynchronous token.

B.

Single Sign-On (SSO) token.

C.

single factor authentication token.

D.

synchronous token.

Without proper signal protection, embedded systems may be prone to which type of attack?

A.

Brute force

B.

Tampering

C.

Information disclosure

D.

Denial of Service (DoS)

Refer to the information below to answer the question.

During the investigation of a security incident, it is determined that an unauthorized individual accessed a system which hosts a database containing financial information.

If it is discovered that large quantities of information have been copied by the unauthorized individual, what attribute of the data has been compromised?

A.

Availability

B.

Integrity

C.

Accountability

D.

Confidentiality

Which of the following is the BEST reason to review audit logs periodically?

A.

Verify they are operating properly

B.

Monitor employee productivity

C.

Identify anomalies in use patterns

D.

Meet compliance regulations

What is the PRIMARY reason for ethics awareness and related policy implementation?

A.

It affects the workflow of an organization.

B.

It affects the reputation of an organization.

C.

It affects the retention rate of employees.

D.

It affects the morale of the employees.

What is the MAIN feature that onion routing networks offer?

A.

Non-repudiation

B.

Traceability

C.

Anonymity

D.

Resilience

Place the following information classification steps in sequential order.

Which of the following secure startup mechanisms are PRIMARILY designed to thwart attacks?

A.

Timing

B.

Cold boot

C.

Side channel

D.

Acoustic cryptanalysis

What is the PRIMARY advantage of using automated application security testing tools?

A.

The application can be protected in the production environment.

B.

Large amounts of code can be tested using fewer resources.

C.

The application will fail less when tested using these tools.

D.

Detailed testing of code functions can be performed.