which part of the incident response phase would this be…
A large organization has recently suffered a massive credit card breach. During the months of Incident Response, there were multiple attempts to assign blame for
whose fault it was that the incident occurred. In which part of the incident response phase would this be addressed in a controlled and productive manner?
Which of the following would help meet these goals by h…
After a security incident, an administrator would like to implement policies that would help reduce fraud and the potential for collusion between employees. Which of
the following would help meet these goals by having co-workers occasionally audit another worker’s position?
Which of the following ensures the organization mitigat…
An organization is selecting a SaaS provider to replace its legacy, in house Customer Resource Management (CRM) application. Which of the following ensures
the organization mitigates the risk of managing separate user credentials?
Which of the following are the MOST appropriate securit…
A company is in the process of outsourcing its customer relationship management system to a cloud provider. It will host the entire organization’s customer
database. The database will be accessed by both the company’s users and its customers. The procurement department has asked what security activities must be
performed for the deal to proceed. Which of the following are the MOST appropriate security activities to be performed as part of due diligence? (Select TWO).
Which of the following should the CIO recommend to the …
The Chief Information Officer (CIO) is reviewing the IT centric BIA and RA documentation. The documentation shows that a single 24 hours downtime in a critical
business function will cost the business $2.3 million. Additionally, the business unit which depends on the critical business function has determined that there is a
high probability that a threat will materialize based on historical data. The CIO’s budget does not allow for full system hardware replacement in case of a
catastrophic failure, nor does it allow for the purchase of additional compensating controls. Which of the following should the CIO recommend to the finance
director to minimize financial loss?
Which of the following are MOST important to include wh…
The Information Security Officer (ISO) is reviewing new policies that have been recently made effective and now apply to the company. Upon review, the ISO
identifies a new requirement to implement two-factor authentication on the company’s wireless system. Due to budget constraints, the company will be unable to
implement the requirement for the next two years. The ISO is required to submit a policy exception form to the Chief Information Officer (CIO). Which of the
following are MOST important to include when submitting the exception form? (Select THREE).
Which of the following is the monetary value earned dur…
A security analyst has been asked to develop a quantitative risk analysis and risk assessment for the company’s online shopping application. Based on heuristic
information from the Security Operations Center (SOC), a Denial of Service Attack (DoS) has been successfully executed 5 times a year. The Business Operations
department has determined the loss associated to each attack is $40,000. After implementing application caching, the number of DoS attacks was reduced to one
time a year. The cost of the countermeasures was $100,000. Which of the following is the monetary value earned during the first year of operation?
Which of the following risks are MOST likely to occur i…
The Chief Executive Officer (CEO) of a large prestigious enterprise has decided to reduce business costs by outsourcing to a third party company in another
country. Functions to be outsourced include: business analysts, testing, software development and back office functions that deal with the processing of customer
data. The Chief Risk Officer (CRO) is concerned about the outsourcing plans. Which of the following risks are MOST likely to occur if adequate controls are not
implemented?
Which of the following is the PRIMARY concern?
A new piece of ransomware got installed on a company’s backup server which encrypted the hard drives containing the OS and backup application configuration
but did not affect the deduplication data hard drives. During the incident response, the company finds that all backup tapes for this server are also corrupt. Which of
the following is the PRIMARY concern?
Which of the following tasks would the security adminis…
An insurance company is looking to purchase a smaller company in another country. Which of the following tasks would the security administrator perform as part
of the security due diligence?