1. Which of the following is the BEST way to identify the potential impact of a successful attack on an organization's mission critical applications?
A) Conduct penetration testing. B) Execute regular vulnerability scans. C) Perform independent code review. D) Perform application vulnerability review.
2. Which of the following is the BEST method to defend against social engineering attacks?
A) Periodically perform antivirus scans to identify malware. B) Communicate guidelines to limit information posted to public sites. C) Employ the use of a web-content filtering solution. D) Monitor for unauthorized access attempts and failed logins.
3. A validated patch to address a new vulnerability that may affect a mission-critical server has been released. What should be done immediately?
A) Add mitigating controls. B) Take the server off-line and install the patch. C) Check the server's security and install the patch. D) Conduct an impact analysis.
4. Which of the following is MOST helpful to maintain cohesiveness within an organization's information security resource?
A) Information security architecture B) Security gap analysis C) Business impact analysis D) Information security steering committee
5. During a review to approve a penetration test plan, which of the following should be an information security manager's PRIMARY concern?
A) Penetration test team's deviation from scope B) Unauthorized access to administrative utilities C) False positive alarms to operations staff D) Impact on production systems
Leave a comment