1. Which of the following is MOST effective in preventing security weaknesses in operating systems?
A) Patch management
B) Change management
C) Security baselines
D) Configuration management
2. When a proposed system change violates an existing security standard, the conflict would be BEST resolved by:
A) calculating the residual risk.
B) enforcing the security standard.
C) redesigning the system change.
D) implementing mitigating controls.
3. Who can BEST approve plans to implement an information security governance framework?
A) Internal auditor
B) Information security management
C) Steering committee
D) Infrastructure management
4. Which of the following is the MOST effective solution for preventing internal users from modifying sensitive and classified information?
A) Baseline security standards
B) System access violation logs
C) Role-based access controls
D) Exit routines
5. Which of the following is generally used to ensure that information transmitted over the Internet is authentic and actually transmitted by the named sender?
A) Biometric authentication
B) Embedded steganographic
C) Two-factor authentication
D) Embedded digital signature