Topic 1: Governance (Policy, Legal & Compliance)
A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should the information security manager take?
A.
Enforce the existing security standards and do not allow the deployment of the new technology.
B.
Amend the standard to permit the deployment.
C.
If the risks associated with that technology are not already identified, perform a risk analysis to quantify the risk, and allow the business unit to proceed based on the identified risk level.
D.
Permit a 90-day window to see if an issue occurs and then amend the standard if there are no issues.
If the risks associated with that technology are not already identified, perform a risk analysis to quantify the risk, and allow the business unit to proceed based on the identified risk level.
When deploying an Intrusion Prevention System (IPS) the BEST way to get maximum protection from the system is to deploy it
A.
In promiscuous mode and only detect malicious traffic.
B.
In-line and turn on blocking mode to stop malicious traffic.
C.
In promiscuous mode and block malicious traffic.
D.
In-line and turn on alert mode to stop malicious traffic.
In-line and turn on blocking mode to stop malicious traffic.
An organization information security policy serves to
A.
establish budgetary input in order to meet compliance requirements
B.
establish acceptable systems and user behavior
C.
define security configurations for systems
D.
define relationships with external law enforcement agencies
establish acceptable systems and user behavior
Which of the following has the GREATEST impact on the implementation of an information security governance model?
A.
Organizational budget
B.
Distance between physical locations
C.
Number of employees
D.
Complexity of organizational structure
Complexity of organizational structure
The PRIMARY objective of security awareness is to:
A.
Ensure that security policies are read.
B.
Encourage security-conscious employee behavior.
C.
Meet legal and regulatory requirements.
D.
Put employees on notice in case follow-up action for noncompliance is necessary
Encourage security-conscious employee behavior.
Page 4 out of 89 Pages |
Previous |