To ensure adequate disaster-preparedness among IT infrastructure personnel, it is MOST important to:

To ensure adequate disaster-preparedness among IT infrastructure personnel, it is MOST important to: have the most experienced personnel participate in recovery tests. include end-user personnel in each recovery test. assign personnel-specific duties in the recovery plan. periodically rotate recovery-test participants.
Continue reading…

 

An organization has announced new initiatives to establish a big data platform and develop mobile apps. What is the FIRST step when defining new human resource requirements?

An organization has announced new initiatives to establish a big data platform and develop mobile apps. What is the FIRST step when defining new human resource requirements? Request additional funding for recruiting and training. Analyze the skills necessary to support the new initiatives. Benchmark to an industry peer. Determine the security technology requirements for the […]
Continue reading…

 

Which of the following attack is against computer network and involves fragmented or invalid ICMP packets sent to the target?

Which of the following attack is against computer network and involves fragmented or invalid ICMP packets sent to the target? Nuke attack Brute force attack Buffer overflow Pulsing Zombie Explanation: A Nuke attack is an old denial-of-service attack against computer networks consisting of fragmented or otherwise invalid ICMP packets sent to the target, achieved by […]
Continue reading…

 

Which of the following is the BEST reason to develop comprehensive information security policies?

Which of the following is the BEST reason to develop comprehensive information security policies? To comply with external industry and government regulations To support development of effective risk indicators To align the information security program to organizational strategy To gain senior management support for the information security program
Continue reading…

 

Which of the following attack redirects outgoing message from the client back onto the client, preventing outside access as well as flooding the client with the sent packets?

Which of the following attack redirects outgoing message from the client back onto the client, preventing outside access as well as flooding the client with the sent packets? Banana attack Brute force attack Buffer overflow Pulsing Zombie Explanation: A “banana attack” is another particular type of DoS. It involves redirecting outgoing messages from the client […]
Continue reading…

 

Which of the following sub-dimension of COBIT 5 describes the extent to which data values are in conformance with the actual true value?

COBIT 5 separates information goals into three sub-dimensions of quality. Which of the following sub-dimension of COBIT 5 describes the extent to which data values are in conformance with the actual true value? Intrinsic quality Contextual and representational quality Security quality Accessibility quality Explanation: Three sub-dimensions of quality in COBIT 5 are as follows: 1. […]
Continue reading…

 

When developing a protection strategy for outsourcing applications, the information security manager MUST ensure that:

When developing a protection strategy for outsourcing applications, the information security manager MUST ensure that: escrow agreements are in place. the security requirements are included in the service level agreement (SLA). the responsibility for security is transferred in the service level agreement (SLA). nondisclosure clauses are in the contract.
Continue reading…

 

Which of the following type of lock uses a magnetic or embedded chip based plastic card key or token entered into a sensor/reader to gain access?

Which of the following type of lock uses a magnetic or embedded chip based plastic card key or token entered into a sensor/reader to gain access? Bolting door locks Combination door lock Electronic door lock Biometric door lock Explanation: Electronic door lock uses a magnetic or embedded chip based plastic card key or token entered […]
Continue reading…

 

Which of the following should be an information security manager’s PRIMARY focus during the development of a critical system storing highly confidential data?

Which of the following should be an information security manager’s PRIMARY focus during the development of a critical system storing highly confidential data? Ensuring the amount of residual risk is acceptable Reducing the number of vulnerabilities detected Avoiding identified system threats Complying with regulatory requirements
Continue reading…

 

Which of the following statement correctly describes the difference between total flooding and local application extinguishing agent?

Which of the following statement correctly describes the difference between total flooding and local application extinguishing agent? The local application design contain physical barrier enclosing the fire space where as physical barrier is not present in total flooding extinguisher The total flooding design contain physical barrier enclosing the fire space where as physical barrier is […]
Continue reading…