1. In order to ensure separation of duties, which of the following activities is BEST performed by someone other than the system administrator?
A) Deleting system logs B) Using system utilities C) Monitoring system utilization D) Defining system recovery procedures
2. Of the following, who should have PRIMARY responsibility for assessing the security risk associated with an outsourced cloud provider contract?
A) Information security manager B) Compliance manager C) Chief information officer D) Service delivery manager
3. The BEST way to mitirate the risk associated with a social engineering attack is to:
A) deploy an effective intrusion detection system (IDS). B) perform a business risk assessment of the email filtering system. C) implement multi-factor authentication on critical business systems. D) perform a user-knowledge gap assessment of information security practices.
4. The PRIMARY purpose for continuous monitoring of security controls is to ensure:
A) system availability. B) control gaps are minimized. C) effectiveness of controls. D) alignment with compliance requirements.
5. To prevent computers on the corporate network from being used as part of a distributed denial of service attack, the information security manager should use:
A) incoming traffic filtering B) outgoing traffic filtering C) IT security policy dissemination D) rate limiting
Leave a comment