Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is the MAIN objective of an intrusion detection system (IDS) policy?

A.

To define the assets covered by intrusion detection systems (IDSs)

B.

To establish the criteria and reporting requirements associated with intrusion events

C.

To define the response time required of security personnel when an intrusion is detected

D.

To establish the actions to be taken by security personnel in the event an intruder is detected

Which of the following is the BEST indication that an organization’s vulnerability management process is operating effectively?

A.

Remediation efforts are communicated to management

B.

The vulnerability program is formally approved

C.

The vulnerability program is reviewed annually.

D.

Remediation efforts are prioritized.

Which of the following contains the essential elements of effective processes and describes an improvement path considering quality and effectiveness?

A.

Capability maturity model integration

B.

Balanced scorecard

C.

60 270042009

D.

COBIT 5

Which of the following describes Secure Hypertext Transfer Protocol (HTTPS)?

A.

HTTP protected by symmetric encryption

B.

HTTP with an encrypted session via Transport Layer Security

C.

HTTP protected by asymmetric encryption

D.

HTTP with an encrypted session via MD5 or RC4 protocols

Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?

A.

It is more secure

B.

It is more reliable

C.

It is higher speed.

D.

It is more cost effective.

Which of the following defines the minimum acceptable rules for policy compliance?

A.

Baselines

B.

Guidelines

C.

Standards

D.

Frameworks

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

A.

Evaluation of implementation details

B.

Hands-on testing

C.

Risk-based shakeout

D.

Inventory and discovery

Which of the following should an IS auditor do FIRST to ensure cyber security-related legal and regulatory requirements are followed by an organization?

A.

Determine if the cybersecurity program is mapped to relevant legal and regulatory requirements.

B.

Review the most recent legal and regulatory audit report conducted by an independent party.

C.

Determine if there is a formal process to review changes in legal and regulatory requirements.

D Obtain a list of relevant legal and regulatory requirements.

Which of the following is MOST important to verify when reviewing the effectiveness of an organization's identity management program?

A.

Processes are approved by the process owner.

B.

Processes are aligned with industry best practices.

C.

Processes are centralized and standardized.

D.

Processes are updated and documented annually.

The most common use of asymmetric algorithms is to:

A.

encrypt bulk data.

B.

encrypt data streams.

C.

distribute symmetric keys.

D.

distribute asymmetric keys.