<< Prev Question Next Question >>

Question 60/159

The PRIMARY objective of security awareness is to:

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (159q)
Question 1: Which of the following functions evaluates patches used to c...
Question 2: What oversight should the information security team have in ...
Question 3: Your company has a "no right to privacy" notice on all logon...
Question 4: SCENARIO: A CISO has several two-factor authentication syste...
Question 5: Which of the following is the MOST important reason to measu...
Question 6: The ability to hold intruders accountable in a court of law ...
Question 7: Which of the following is of MOST importance when security l...
Question 8: Creating good security metrics is essential for a CISO. What...
Question 9: The process for management approval of the security certific...
Question 10: Providing oversight of a comprehensive information security ...
Question 11: Who is responsible for securing networks during a security i...
Question 12: Which of the following represents the HIGHEST negative impac...
Question 13: Scenario: A Chief Information Security Officer (CISO) recent...
Question 14: When deploying an Intrusion Prevention System (IPS), the BES...
Question 15: Which of the following is an accurate description of a balan...
Question 16: Which of the following activities is the MAIN purpose of the...
Question 17: What is the first thing that needs to be completed in order ...
Question 18: Which of the following is the MAIN reason to follow a formal...
Question 19: One of your executives needs to send an important and confid...
Question 20: You are the Chief Information Security Officer of a large, m...
Question 21: When choosing a risk mitigation method what is the MOST impo...
Question 22: A system was hardened at the Operating System level and plac...
Question 23: The organization does not have the time to remediate the vul...
Question 24: SCENARIO: A CISO has several two-factor authentication syste...
Question 25: What is one key difference between Capital expenditures and ...
Question 26: The security team has investigated the theft/loss of several...
Question 27: The CIO of an organization has decided to assign the respons...
Question 28: What should an organization do to ensure that they have a so...
Question 29: Scenario: Most industries require compliance with multiple g...
Question 30: File Integrity Monitoring (FIM) is considered a...
Question 31: Which of the following is a countermeasure to prevent unauth...
Question 32: The executive board has requested that the CISO of an organi...
Question 33: Scenario: Your organization employs single sign-on (user nam...
Question 34: The network administrator wants to strengthen physical secur...
Question 35: An organization's firewall technology needs replaced. A spec...
Question 36: Scenario: Your company has many encrypted telecommunications...
Question 37: Which of the following organizations is typically in charge ...
Question 38: An IT auditor has recently discovered that because of a shor...
Question 39: Knowing the potential financial loss an organization is will...
Question 40: An employee successfully avoids becoming a victim of a sophi...
Question 41: Creating a secondary authentication process for network acce...
Question 42: The BEST organization to provide a comprehensive, independen...
Question 43: The MOST common method to get an unbiased measurement of the...
Question 44: The process of creating a system which divides documents bas...
Question 45: Which of the following reports should you as an IT auditor u...
Question 46: Your incident handling manager detects a virus attack in the...
Question 47: The rate of change in technology increases the importance of...
Question 48: When gathering security requirements for an automated busine...
Question 49: Assigning the role and responsibility of Information Assuran...
Question 50: When dealing with risk, the information security practitione...
Question 51: Which of the following methods are used to define contractua...
Question 52: Scenario: Your program is developed around minimizing risk t...
Question 53: The Information Security Management program MUST protect:...
Question 54: Which of the following represents the BEST method for obtain...
Question 55: Which of the following would negatively impact a log analysi...
Question 56: The framework that helps to define a minimum standard of pro...
Question 57: Network Forensics is the prerequisite for any successful leg...
Question 58: Which of the following are the MOST important factors for pr...
Question 59: Human resource planning for security professionals in your o...
Question 60: The PRIMARY objective of security awareness is to:...
Question 61: Risk is defined as:
Question 62: Which of the following is the MOST effective way to measure ...
Question 63: Scenario: An organization has recently appointed a CISO. Thi...
Question 64: The newly appointed CISO of an organization is reviewing the...
Question 65: The executive board has requested that the CISO of an organi...
Question 66: Which of the following is true regarding expenditures?...
Question 67: A customer of a bank has placed a dispute on a payment for a...
Question 68: When should IT security project management be outsourced?...
Question 69: The purpose of NIST SP 800-53 as part of the NIST System Cer...
Question 70: An organization has implemented a change management process ...
Question 71: An anonymity network is a series of?...
Question 72: Dataflow diagrams are used by IT auditors to:...
Question 73: When briefing senior management on the creation of a governa...
Question 74: Which of the following functions MUST your Information Secur...
Question 75: Scenario: Your program is developed around minimizing risk t...
Question 76: In terms of supporting a forensic investigation, it is now i...
Question 77: What is the first thing that needs to be completed in order ...
Question 78: Which of the following are not stakeholders of IT security p...
Question 79: As a CISO you need to understand the steps that are used to ...
Question 80: When a critical vulnerability has been discovered on product...
Question 81: The effectiveness of social engineering penetration testing ...
Question 82: You are the Chief Information Security Officer of a large, m...
Question 83: The CIO of an organization has decided to assign the respons...
Question 84: The process for identifying, collecting, and producing digit...
Question 85: The exposure factor of a threat to your organization is defi...
Question 86: John is the project manager for a large project in his organ...
Question 87: The process of identifying and classifying assets is typical...
Question 88: SCENARIO: A Chief Information Security Officer (CISO) recent...
Question 89: What oversight should the information security team have in ...
Question 90: The BEST organization to provide a comprehensive, independen...
Question 91: The new CISO was informed of all the Information Security pr...
Question 92: The PRIMARY objective for information security program devel...
Question 93: A CISO implements smart cards for credential management, and...
Question 94: What does RACI stand for?
Question 95: Scenario: You are the CISO and have just completed your firs...
Question 96: A person in your security team calls you at night and inform...
Question 97: An audit was conducted and many critical applications were f...
Question 98: Which of the following is critical in creating a security pr...
Question 99: The PRIMARY objective for information security program devel...
Question 100: An international organization is planning a project to imple...
Question 101: Which of the following is the MOST important reason for perf...
Question 102: Which of the following best describes an access control proc...
Question 103: Which of the following tests is an IS auditor performing whe...
Question 104: A company wants to fill a Chief Information Security Officer...
Question 105: Payment Card Industry (PCI) compliance requirements are base...
Question 106: Smith, the project manager for a larger multi-location firm,...
Question 107: Which of the following terms is used to describe countermeas...
Question 108: A new CISO just started with a company and on the CISO's des...
Question 109: Scenario: An organization has recently appointed a CISO. Thi...
Question 110: SQL injection is a very popular and successful injection att...
Question 111: During the course of a risk analysis your IT auditor identif...
Question 112: What are the primary reasons for the development of a busine...
Question 113: You are having a penetration test done on your company netwo...
Question 114: Scenario: Your company has many encrypted telecommunications...
Question 115: A CISO implements smart cards for credential management, and...
Question 116: After a risk assessment is performed, a particular risk is c...
Question 117: A consultant is hired to do physical penetration testing at ...
Question 118: The ability to hold intruders accountable in a court of law ...
Question 119: Scenario: The new CISO was informed of all the Information S...
Question 120: Which of the following is the BEST indicator of a successful...
Question 121: When managing the security architecture for your company you...
Question 122: The new CISO was informed of all the Information Security pr...
Question 123: Which of the following will be MOST helpful for getting an I...
Question 124: When deploying an Intrusion Prevention System (IPS) the BEST...
Question 125: Who should be involved in the development of an internal cam...
Question 126: Scenario: Your corporate systems have been under constant pr...
Question 127: Physical security measures typically include which of the fo...
Question 128: When project costs continually increase throughout implement...
Question 129: SCENARIO: A CISO has several two-factor authentication syste...
Question 130: An organization is looking for a framework to measure the ef...
Question 131: A person in your security team calls you at night and inform...
Question 132: Your penetration testing team installs an in-line hardware k...
Question 133: The company decides to release the application without remed...
Question 134: Network Forensics is the prerequisite for any successful leg...
Question 135: What oversight should the information security team have in ...
Question 136: A global retail organization is looking to implement a consi...
Question 137: Scenario: An organization has recently appointed a CISO. Thi...
Question 138: Which of the following most commonly falls within the scope ...
Question 139: According to ISO 27001, of the steps for establishing an Inf...
Question 140: What is an approach to estimating the strengths and weakness...
Question 141: What is the term describing the act of inspecting all real-t...
Question 142: The PRIMARY objective for information security program devel...
Question 143: As the Chief Information Security Officer, you want to ensur...
Question 144: Which of the following can the company implement in order to...
Question 145: A security manager has created a risk program. Which of the ...
Question 146: Using the Transport Layer Security (TLS) protocol enables a ...
Question 147: You have purchased a new insurance policy as part of your ri...
Question 148: A CISO sees abnormally high volumes of exceptions to securit...
Question 149: Which type of physical security control scan a person's exte...
Question 150: Which of the following is a primary method of applying consi...
Question 151: SCENARIO: A Chief Information Security Officer (CISO) recent...
Question 152: Which of the following is the MOST important benefit of an e...
Question 153: Scenario: Your company has many encrypted telecommunications...
Question 154: From an information security perspective, information that n...
Question 155: When should IT security project management be outsourced?...
Question 156: Which of the following is considered the MOST effective tool...
Question 157: When deploying an Intrusion Prevention System (IPS) the BEST...
Question 158: Many times a CISO may have to speak to the Board of Director...
Question 159: What type of attack requires the least amount of technical e...