1. Executive management is considering outsourcing all IT operations. Which of the following functions should remain internal?
A) Data ownership B) Data monitoring C) Data custodian D) Data encryption
2. When outsourcing data to a cloud service provider, which of the following should be the information security manager's MOST important consideration?
A) Roles and responsibilities have been defined for the subscriber organization. B) Cloud servers are located in the same country as the organization. C) Access authorization includes biometric security verification. D) Data stored at the cloud service provider is not co-mingled.
3. Without prior approval, a training department enrolled the company in a free cloud-based collaboration site and invited employees to use it. Which of the following is the BEST response of the information security manager?
A) Conduct a risk assessment and develop an impact analysis. B) Update the risk register and review the information security strategy. C) Report the activity to senior management. D) Allow temporary use of the site and monitor for data leakage.
4. A global organization has developed a strategy to share a customer information database between offices in two countries. In this situation, it is MOST important to ensure:
A) data sharing complies with local laws and regulations at both locations. B) data is encrypted in transit and at rest. C) a nondisclosure agreement is signed. D) risk coverage is split between the two locations sharing data.
5. Which of the following is MOST likely to reduce the effectiveness of a signature-based intrusion detection system (IDS)?
A) The activities being monitored deviate from what is considered normal. B) The information regarding monitored activities becomes stale. C) The pattern of normal behavior changes quickly and dramatically. D) The environment is complex.
Leave a comment