Scenario: Your corporate systems have been under constant probing and attack from foreign IP addresses for more than a week. Your security team and security infrastructure have performed well under the stress. You are confident that your defenses have held up under the test, but rumors are spreading that sensitive customer data has been stolen and is now being sold on the Internet by criminal elements. During your investigation of the rumored compromise you discover that data has been breached and you have discovered the repository of stolen data on a server located in a foreign country. Your team now has full access to the data on the foreign server. Your defenses did not hold up to the test as originally thought. As you investigate how the data was compromised through log analysis you discover that a hardworking, but misguided business intelligence analyst posted the data to an obfuscated URL on a popular cloud storage service so they could work on it from home during their off-time. Which technology or solution could you deploy to prevent employees from removing corporate data from your network? Choose the best answer.
Q: 11
When would it be more desirable to develop a set of decentralized security policies and procedures
within an enterprise environment?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
If your organization operates under a model of "assumption of breach", you should:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
What is the definition of Risk in Information Security?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
Quantitative Risk Assessments have the following advantages over qualitative risk assessments:
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of
the security program. Internal policies and international standards were used as audit baselines. The
audit report was presented to the CISO and a variety of high, medium and low rated gaps were
identified.
The CISO has implemented remediation activities. Which of the following is the MOST logical next
step?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
Smith, the project manager for a larger multi-location firm, is leading a software project team that
has 18
members, 5 of which are assigned to testing. Due to recent recommendations by an organizational
quality audit
team, the project manager is convinced to add a quality professional to lead to test team at
additional cost to
the project.
The project manager is aware of the importance of communication for the success of the project and
takes the
step of introducing additional communication channels, making it more complex, in order to assure
quality
levels of the project. What will be the first project management document that Smith should change
in order to
accommodate additional communication channels?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
Which regulation or policy governs protection of personally identifiable user data gathered during a
cyber investigation?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
Scenario: Your organization employs single sign-on (user name and password only) as a convenience
to your employees to access organizational systems and data. Permission to individual systems and
databases is vetted and approved through supervisors and data owners to ensure that only approved
personnel can use particular applications or retrieve information. All employees have access to their
own human resource information, including the ability to change their bank routing and account
information and other personal details through the Employee Self-Service application. All employees
have access to the organizational VPN.
What type of control is being implemented by supervisors and data owners?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2