1.
Good information security standards should:
2.
Good information security procedures should:
3.
What is the MAIN drawback of e-mailing password-protected zip files across the Internet? They:
4.
A major trading partner with access to the internal network is unwilling or unable to remediate serious information security exposures within its environment. Which of the following is the BEST recommendation?
5.
Which of the following is the MOST immediate consequence of failing to tune a newly installed intrusion detection system (IDS) with the threshold set to a low value?
6.
Who is ultimately responsible for ensuring that information is categorized and that protective measures are taken?
7.
A critical device is delivered with a single user and password that is required to be shared for multiple users to access the device. An information security manager has been tasked with ensuring all access to the device is authorized. Which of the following would be the MOST efficient means to accomplish this?
8.
Which of the following documents would be the BEST reference to determine whether access control mechanisms are appropriate for a critical application?
9.
Which resource is the MOST effective in preventing physical access tailgating/piggybacking?
10.
In business critical applications, where shared access to elevated privileges by a small group is necessary, the BEST approach to implement adequate segregation of duties is to: