<< Prev Question Next Question >>

Question 19/115

What is meant by password aging?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (115q)
Question 1: A method to transfer risk is to:...
Question 2: The exposure factor of a threat to your organization is defi...
Question 3: The process of identifying and classifying assets is typical...
Question 4: Which of the following reports should you as an IT auditor u...
Question 5: Which of the following are the triple constraints of project...
Question 6: Which of the following international standards can be BEST u...
Question 7: Who is responsible for securing networks during a security i...
Question 8: Which of the following defines the boundaries and scope of a...
Question 9: SCENARIO: A Chief Information Security Officer (CISO) recent...
Question 10: Which of the following terms is used to describe countermeas...
Question 11: At which point should the identity access management team be...
Question 12: Which of the following is an accurate statement regarding ca...
Question 13: What type of attack requires the least amount of technical e...
Question 14: A Security Operations Centre (SOC) manager is informed that ...
Question 15: An organization is looking for a framework to measure the ef...
Question 16: Acme Inc. has engaged a third party vendor to provide 99.999...
Question 17: When a critical vulnerability has been discovered on product...
Question 18: A CISO decides to analyze the IT infrastructure to ensure se...
Question 19: What is meant by password aging?...
Question 20: An organization's Information Security Policy is of MOST imp...
Question 21: An organization has implemented a change management process ...
Question 22: Risk appetite directly affects what part of a vulnerability ...
Question 23: What should an organization do to ensure that they have a so...
Question 24: A CISO has recently joined an organization with a poorly imp...
Question 25: A new CISO just started with a company and on the CISO's des...
Question 26: Risk is defined as:
Question 27: Which of the following can the company implement in order to...
Question 28: You are just hired as the new CISO and are being briefed on ...
Question 29: SCENARIO: A CISO has several two-factor authentication syste...
Question 30: You are the Chief Information Security Officer of a large, m...
Question 31: As the Chief Information Security Officer, you are performin...
Question 32: A CISO decides to analyze the IT infrastructure to ensure se...
Question 33: In terms of supporting a forensic investigation, it is now i...
Question 34: What is the definition of Risk in Information Security?...
Question 35: The PRIMARY objective for information security program devel...
Question 36: In order for a CISO to have true situational awareness there...
Question 37: From an information security perspective, information that n...
Question 38: A newly-hired CISO needs to understand the organization's fi...
Question 39: Which of the following functions evaluates risk present in I...
Question 40: An organization has a stated requirement to block certain tr...
Question 41: A newly appointed security officer finds data leakage softwa...
Question 42: The implementation of anti-malware and anti-phishing control...
Question 43: The ability to demand the implementation and management of s...
Question 44: A company wants to fill a Chief Information Security Officer...
Question 45: Providing oversight of a comprehensive information security ...
Question 46: Which of the following illustrates an operational control pr...
Question 47: Which represents PROPER separation of duties in the corporat...
Question 48: An information security department is required to remediate ...
Question 49: Quantitative Risk Assessments have the following advantages ...
Question 50: Which type of physical security control scan a person's exte...
Question 51: Which of the following is considered the MOST effective tool...
Question 52: Which of the following most commonly falls within the scope ...
Question 53: Which of the following represents the HIGHEST negative impac...
Question 54: A department within your company has proposed a third party ...
Question 55: A key cybersecurity feature of a Personal Identification Ver...
Question 56: As the new CISO at the company you are reviewing the audit r...
Question 57: Which of the following BEST describes an international stand...
Question 58: During the 3rd quarter of a budget cycle, the CISO noticed s...
Question 59: Which of the following has the GREATEST impact on the implem...
Question 60: The establishment of a formal risk management framework and ...
Question 61: Credit card information, medical data, and government record...
Question 62: Many times a CISO may have to speak to the Board of Director...
Question 63: What is the BEST way to achieve on-going compliance monitori...
Question 64: When should IT security project management be outsourced?...
Question 65: Step-by-step procedures to regain normalcy in the event of a...
Question 66: When entering into a third party vendor agreement for securi...
Question 67: What is one key difference between Capital expenditures and ...
Question 68: Which of the following is a symmetric encryption algorithm?...
Question 69: Which of the following would negatively impact a log analysi...
Question 70: What is the first thing that needs to be completed in order ...
Question 71: The total cost of security controls should:...
Question 72: What two methods are used to assess risk impact?...
Question 73: How often should an environment be monitored for cyber threa...
Question 74: Which of the following is used to establish and maintain a f...
Question 75: The Annualized Loss Expectancy (Before) minus Annualized Los...
Question 76: SCENARIO: A CISO has several two-factor authentication syste...
Question 77: Dataflow diagrams are used by IT auditors to:...
Question 78: Which of the following strategies provides the BEST response...
Question 79: Which technology can provide a computing environment without...
Question 80: When a CISO considers delaying or not remediating system vul...
Question 81: Information Security is often considered an excessive, after...
Question 82: The security team has investigated the theft/loss of several...
Question 83: Scenario: Your company has many encrypted telecommunications...
Question 84: Which of the following is the MOST effective method for disc...
Question 85: When you develop your audit remediation plan what is the MOS...
Question 86: Human resource planning for security professionals in your o...
Question 87: A Chief Information Security Officer received a list of high...
Question 88: Which of the following will be MOST helpful for getting an I...
Question 89: Scenario: You are the CISO and are required to brief the C-l...
Question 90: You work as a project manager for TYU project. You are plann...
Question 91: Your incident response plan should include which of the foll...
Question 92: Which of the following best describes an access control proc...
Question 93: Which of the following activities must be completed BEFORE y...
Question 94: A security manager has created a risk program. Which of the ...
Question 95: If the result of an NPV is positive, then the project should...
Question 96: Which of the following is a common technology for visual mon...
Question 97: A consultant is hired to do physical penetration testing at ...
Question 98: The general ledger setup function in an enterprise resource ...
Question 99: The single most important consideration to make when develop...
Question 100: The process for identifying, collecting, and producing digit...
Question 101: Which of the following is considered a project versus a mana...
Question 102: Scenario: As you begin to develop the program for your organ...
Question 103: A security officer wants to implement a vulnerability scanni...
Question 104: Scenario: You are the CISO and are required to brief the C-l...
Question 105: Scenario: An organization has made a decision to address Inf...
Question 106: What oversight should the information security team have in ...
Question 107: A business unit within your organization intends to deploy a...
Question 108: A severe security threat has been detected on your corporate...
Question 109: The effectiveness of social engineering penetration testing ...
Question 110: With respect to the audit management process, management res...
Question 111: Which of the following represents the BEST method for obtain...
Question 112: After a risk assessment is performed, a particular risk is c...
Question 113: Which type of scan is used on the eye to measure the layer o...
Question 114: What is the MAIN reason for conflicts between Information Te...
Question 115: Scenario: You are the CISO and have just completed your firs...