Topic 1: Exam Pool A
Vlady works in a fishing company where the majority of the employees have very little
understanding of IT let alone IT Security. Several information security issues that Vlady
often found includes, employees sharing password, writing his/her password on a post it
note and stick it to his/her desk, leaving the computer unlocked, didn’t log out from emails
or other social media accounts, and etc.
After discussing with his boss, Vlady decided to make some changes to improve the
security environment in his company. The first thing that Vlady wanted to do is to make the
employees understand the importance of keeping confidential information, such as
password, a secret and they should not share it with other persons.
Which of the following steps should be the first thing that Vlady should do to make the
employees in his company understand to importance of keeping confidential information a
secret?
A.
Warning to those who write password on a post it note and put it on his/her desk
B.
Developing a strict information security policy
C.
Information security awareness training
D.
Conducting a one to one discussion with the other employees about the importance of
information security
Warning to those who write password on a post it note and put it on his/her desk
Bob finished a C programming course and created a small C application to monitor the
network traffic and produce alerts when any origin sends “many” IP packets, based on the
average number of packets sent by all origins and using some thresholds.
In concept, the solution developed by Bob is actually:
A.
Just a network monitoring tool
B.
signature-based IDS
C.
hybrid IDS
D.
A behavior-based IDS
Just a network monitoring tool
Which of the following act requires employer’s standard national numbers to identify them
on standard transactions?
A.
SOX
B.
HIPAA
C.
DMCA
D.
PCI-DSS
HIPAA
Which of the following DoS tools is used to attack target web applications by starvation of
available sessions on the web server?
The tool keeps sessions at halt using never-ending POST transmissions and sending an
arbitrarily large content-length header value.
A.
My Doom
B.
Astacheldraht
C.
R-U-Dead-Yet?(RUDY)
D.
LOIC
R-U-Dead-Yet?(RUDY)
Nedved is an IT Security Manager of a bank in his country. One day. he found out that
there is a security breach to his company's email server based on analysis of a suspicious
connection from the email server to an unknown IP Address.
What is the first thing that Nedved needs to do before contacting the incident response'
team?
A.
Leave it as it Is and contact the incident response te3m right away
B.
Block the connection to the suspicious IP Address from the firewall
C.
Disconnect the email server from the network
D.
Migrate the connection to the backup email server
Disconnect the email server from the network
Page 1 out of 147 Pages |