After a server has been attacked, which of the following is the BEST course of action?
After a server has been attacked, which of the following is the BEST course of action?A . Review vulnerability assessmentB . Conduct a security auditC . Initiate modem responseD . Isolate the system.View AnswerAnswer: C
Senior management has approved employees working off-site by using a virtual private network (VPN) connection.
Senior management has approved employees working off-site by using a virtual private network (VPN) connection. It is MOST important for the information security manager to periodically:A . perform a cost-benefit analysis.B . perform a risk assessment.C . review firewall configuration.D . review the security policy.View AnswerAnswer: B
Which is MOST important to enable a timely response to a security breach?
Which is MOST important to enable a timely response to a security breach?A . Knowledge sharing and collaborationB . Security event loggingC . Roles and responsibilitiesD . Forensic analysisView AnswerAnswer: C
Which of the following should be of GREATEST concern to the organizations information security manager?
An emergency change was made to an IT system as a result of a failure. Which of the following should be of GREATEST concern to the organizations information security manager?A . The change did not include a proper assessment of risk.B . Documentation of the change was made after implementation.C...
An organization has implemented an enhanced password policy for business applications which requires significantly more business resource to support clients.
An organization has implemented an enhanced password policy for business applications which requires significantly more business resource to support clients. The BEST approach to obtain the support of business management would be to:A . Present an analysis of the cost and benefit of the changesB . Elaborate on the positive...
The GREATEST benefit of choosing a private cloud over a public cloud would be:
The GREATEST benefit of choosing a private cloud over a public cloud would be:A . containment of customer dataB . collection of data forensicC . online service availability.D . server protection.View AnswerAnswer: A
Which of the following will BEST help to ensure security is addressed when developing a custom application?
Which of the following will BEST help to ensure security is addressed when developing a custom application?A . Conducting security training for the development staffB . Integrating security requirements into the development processC . Requiring a security assessment before implementationD . Integrating a security audit throughout the development processView AnswerAnswer:...
Which of the following is the BEST resource for evaluating the strengths and weaknesses of an incident response plan?
Which of the following is the BEST resource for evaluating the strengths and weaknesses of an incident response plan?A . Recovery time objectives (RTOs)B . Mission, goals and objectivesC . Incident response maturity assessmentD . Documentation from preparedness testsView AnswerAnswer: D
Which of the following is the MOST effective approach for integrating security into application development?
Which of the following is the MOST effective approach for integrating security into application development?A . Including security in user acceptance testing sign-offB . Performing vulnerability scansC . Defining security requirementsD . Developing security models in parallelView AnswerAnswer: C
Which of the following is the BEST way to prevent employees from making unauthorized comments to the media about security incidents in progress?
Which of the following is the BEST way to prevent employees from making unauthorized comments to the media about security incidents in progress?A . Establish standard media responses for employees to control the messageB . Communicate potential disciplinary actions for noncompliance.C . Include communication policies In regular information security trainingD...