Which of the following controls would be the MOST relevant and effective in detecting zero day attacks?
Why might the reporting of security incidents that involve personal data differ from other types of security incident?
Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD) within the Information Security sphere?
What aspect of an employee's contract of employment Is designed to prevent the unauthorised release of confidential data to third parties even after an employee has left their employment?
Which of the following is NOT a valid statement to include in an organisation's security policy?
What type of diagram used in application threat modeling includes malicious users as well as descriptions like mitigates and threatens?
Which security framework impacts on organisations that accept credit cards, process credit card transactions, store relevant data or transmit credit card data?
Which of the following international standards deals with the retention of records?
What types of web application vulnerabilities continue to be the MOST prolific according to the OWASP Top 10?
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
What are the different methods that can be used as access controls?
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
When establishing objectives for physical security environments, which of the following functional controls SHOULD occur first?
How does the use of a "single sign-on" access control policy improve the security for an organisation implementing the policy?
Which of the following is often the final stage in the information management lifecycle?
When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always be taken into consideration?
Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?
Geoff wants to ensure the application of consistent security settings to devices used throughout his organisation whether as part of a mobile computing or a BYOD approach.
What technology would be MOST beneficial to his organisation?
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
What term is used to describe the testing of a continuity plan through a written scenario being used as the basis for discussion and simul-ation?
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?
Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?
Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?