What is the appropriate next step?
A computer technician is using a new version of a word processing software package when it is discovered that
a special sequence of characters causes the entire computer to crash. The technician researches the bug and
discovers that no one else experienced the problem. What is the appropriate next step?
What is the consultant’s obligation to the financial or…
A consultant has been hired by the V.P. of a large financial organization to assess the company’s security
posture. During the security testing, the consultant comes across child pornography on the V.P.’s computer.
What is the consultant’s obligation to the financial organization?
Which initial procedure should an ethical hacker perfor…
Which initial procedure should an ethical hacker perform after being brought into an organization?
What actions should the CEH take?
A certified ethical hacker (CEH) completed a penetration test of the main headquarters of a company almost
two months ago, but has yet to get paid. The customer is suffering from financial problems, and the CEH is
worried that the company will go out of business and end up not paying. What actions should the CEH take?
What should the hacker’s next step be before starting w…
An ethical hacker for a large security research firm performs penetration tests, vulnerability tests, and risk
assessments. A friend recently started a company and asks the hacker to perform a penetration test and
vulnerability assessment of the new company as a favor. What should the hacker’s next step be before starting
work on this job?
Which type of security document is written with specifi…
Which type of security document is written with specific step-by-step details?
International Organization for Standardization (ISO) st…
International Organization for Standardization (ISO) standard 27002 provides guidance for compliance by
outlining
Which of the following guidelines or standards is assoc…
Which of the following guidelines or standards is associated with the credit card industry?
Which method can provide a better return on IT security…
Which method can provide a better return on IT security investment and provide a thorough and
comprehensive assessment of organizational security covering policy, procedure design, and implementation?
How can a policy help improve an employee’s security aw…
How can a policy help improve an employee’s security awareness?