1.
A third party was engaged to develop a business application. Which of the following would an information security manager BEST test for the existence of back doors?
2.
Which of the following is the MOST effective at preventing an unauthorized individual from following an authorized person through a secured entrance (tailgating or piggybacking)?
3.
Which item would be the BEST to include in the information security awareness training program for new general staff employees?
4.
A critical component of a continuous improvement program for information security is:
5.
The management staff of an organization that does not have a dedicated security function decides to use its IT manager to perform a security review. The MAIN job requirement in this arrangement is that the IT manager

 
6.
Which of the following is the MAIN objective in contracting with an external company to perform penetration testing?
7.
An organization plans to outsource its customer relationship management (CRM) to a third-party service provider. Which of the following should the organization do FIRST?
8.
Which of the following would raise security awareness among an organization's employees?
9.
An organization is entering into an agreement with a new business partner to conduct customer mailings. What is the MOST important action that the information security manager needs to perform?
10.
An organization that outsourced its payroll processing performed an independent assessment of the security controls of the third party, per policy requirements. Which of the following is the MOST useful requirement to include in the contract?