1.
An information security department is required to remediate system vulnerabilities when they are discovered. Please select the three primary remediation methods that can be used on an affected system.
2.
Which of the following best describes the purpose of the International Organization for Standardization (ISO) 27002 standard?
3.
Which represents PROPER separation of duties in the corporate environment?
4.
When working in the Payment Card Industry (PCI), how often should security logs be review to comply with the standards?
5.
The MOST common method to get an unbiased measurement of the effectiveness of an Information Security Management System (ISMS) is to_________________________.
6.
The ultimate goal of an IT security projects is:
7.
An organization has implemented a change management process for all changes to the IT production environment. This change management process follows best practices and is expected to help stabilize the availability and integrity of the organization's IT environment. Which of the following can be used to measure the effectiveness of this newly implemented process?
8.
You have implemented the new controls. What is the next step?
9.
Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY covered by which of the following plans?
10.
An employee successfully avoids becoming a victim of a sophisticated spear phishing attack due to knowledge gained through the corporate information security awareness program. What type of control has been effectively utilized?