[ { "question": "Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?", "options": { "A": "Asterisk logger", "B": "FAU", "C": "Access Pass View", "D": "Galleta" }, "answer": "C", "explanation": "" }, { "question": "Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months and six months already passed. Management asks Mark that how often the project team is participating in the risk reassessment of this project. What should Mark tell management if he is following the best practices for risk management?", "options": { "A": "At every status meeting of the project team, project risk management is an agenda item.", "B": "Project risk management happens at every milestone.", "C": "Project risk management has been concluded with the project planning.", "D": "Project risk management is scheduled for every month in the 18-month project." }, "answer": "A", "explanation": "" }, { "question": "You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?", "options": { "A": "Quantitative analysis", "B": "Estimate activity duration", "C": "Risk identification", "D": "Qualitative analysis" }, "answer": "D", "explanation": "" }, { "question": "Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question?", "options": { "A": "Guarantee the reliability of standby systems through testing and simulation.", "B": "Protect an organization from major computer services failure.", "C": "Minimize the risk to the organization from delays in providing services.", "D": "Maximize the decision-making required by personnel during a disaster." }, "answer": "ABC", "explanation": "" }, { "question": "Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?", "options": { "A": "Emergency management team", "B": "Damage assessment team", "C": "Off-site storage team", "D": "Emergency action team" }, "answer": "D", "explanation": "" }, { "question": "Which of the following response teams aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large?", "options": { "A": "CERT", "B": "CSIRT", "C": "FedCIRC", "D": "FIRST" }, "answer": "D", "explanation": "" }, { "question": "You are responsible for network and information security at a large hospital. It is a significant concern that any change to any patient record can be easily traced back to the person who made that change. What is this called?", "options": { "A": "Availability", "B": "Non repudiation", "C": "Confidentiality", "D": "Data Protection" }, "answer": "B", "explanation": "" }, { "question": "Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?", "options": { "A": "Password guessing attack", "B": "Dictionary attack", "C": "Man-in-the-middle attack", "D": "Denial-of-service attack" }, "answer": "C", "explanation": "" }, { "question": "Which of the following statements best describes the difference between the role of a data owner and the role of a data custodian?", "options": { "A": "The custodian makes the initial information classification assignments and the operations manager implements the scheme.", "B": "The custodian implements the information classification scheme after the initial assignment by the operations manager.", "C": "The data custodian implements the information classification scheme after the initial assignment by the data owner.", "D": "The data owner implements the information classification scheme after the initial assignment by the custodian." }, "answer": "C", "explanation": "" }, { "question": "Which of the following cryptographic system services assures the receiver that the received message has not been altered?", "options": { "A": "Authentication", "B": "Confidentiality", "C": "Non-repudiation", "D": "Integrity" }, "answer": "D", "explanation": "" }, { "question": "Which of the following statements about disaster recovery plan documentation are true?", "options": { "A": "The documentation regarding a disaster recovery plan should be stored in backup tapes.", "B": "The documentation regarding a disaster recovery plan should be stored in floppy disks.", "C": "The disaster recovery plan documentation should be stored onsite only.", "D": "The disaster recovery plan documentation should be stored offsite only." }, "answer": "AD", "explanation": "" }, { "question": "Which of the following is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in business continuity?", "options": { "A": "RTA", "B": "RPO", "C": "RCO", "D": "RTO" }, "answer": "D", "explanation": "" }, { "question": "Which of the following roles is responsible for the review and risk analysis of all the contracts on regular basis?", "options": { "A": "The IT Service Continuity Manager", "B": "The Configuration Manager", "C": "The Supplier Manager", "D": "The Service Catalogue Manager" }, "answer": "C", "explanation": "" }, { "question": "You work as a Database Administrator for Bluewell Inc. The company has a SQL Server 2005 computer. The company asks you to implement a RAID system to provide fault tolerance to a database. You want to implement disk mirroring. Which of the following RAID levels will you use to accomplish the task?", "options": { "A": "RAID-5", "B": "RAID-0", "C": "RAID-1", "D": "RAID-10" }, "answer": "C", "explanation": "" }, { "question": "Which of the following control measures are considered while creating a disaster recovery plan?", "options": { "A": "Detective measures", "B": "Supportive measures", "C": "Corrective measures", "D": "Preventive measures" }, "answer": "ACD", "explanation": "" }, { "question": "Which of the following are some of the parts of a project plan?", "options": { "A": "Risk identification", "B": "Team members list", "C": "Risk analysis", "D": "Project schedule" }, "answer": "ABCD", "explanation": "" }, { "question": "Which of the following statements are true about classless routing protocols?", "options": { "A": "The same subnet mask is used everywhere on the network.", "B": "They extend the IP addressing scheme.", "C": "IGRP is a classless routing protocol.", "D": "They support VLSM and discontiguous networks." }, "answer": "BD", "explanation": "" }, { "question": "Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?", "options": { "A": "Snooping", "B": "Patent", "C": "Utility model", "D": "Copyright" }, "answer": "B", "explanation": "" }, { "question": "Availability Management deals with the day-to-day availability of services. Which of the following takes over when a 'disaster' situation occurs?", "options": { "A": "Capacity Management", "B": "Service Level Management", "C": "Service Continuity Management", "D": "Service Reporting" }, "answer": "C", "explanation": "" }, { "question": "IT Service Continuity Management (ITSCM) is used to support the overall Business Continuity Management (BCM) in order to ensure that the required IT infrastructure and the IT service provision are recovered within an agreed business time scales. Which of the following are the benefits of implementing IT Service Continuity Management?", "options": { "A": "It prioritizes the recovery of IT services by working with BCM and SLM.", "B": "It minimizes costs related with recovery plans using proper proactive planning and testing.", "C": "It confirms competence, impartiality, and performance capability of an organization that performs audits.", "D": "It minimizes disruption in IT services when it follows a major interruption or disaster." }, "answer": "ABD", "explanation": "" }, { "question": "You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?", "options": { "A": "Eradication", "B": "Identification", "C": "Containment", "D": "Recovery" }, "answer": "A", "explanation": "" }, { "question": "Which of the following is established during the Business Impact Analysis by the owner of a process in accepted business continuity planning methodology?", "options": { "A": "Recovery Consistency Objective", "B": "Recovery Time Objective", "C": "Recovery Point Objective", "D": "Recovery Time Actual" }, "answer": "B", "explanation": "" }, { "question": "Which of the following options is an intellectual property right to protect inventions?", "options": { "A": "Snooping", "B": "Patent", "C": "Copyright", "D": "Utility model" }, "answer": "D", "explanation": "" }, { "question": "Pete works as a Network Security Officer for Gentech Inc. He wants to encrypt his network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which of the following techniques will he use to fulfill this requirement?", "options": { "A": "AES", "B": "DES", "C": "IDEA", "D": "PGP" }, "answer": "B", "explanation": "" }, { "question": "Which of the following is the simulation of the disaster recovery plans?", "options": { "A": "Walk-through test", "B": "Full operational test", "C": "Paper test", "D": "Preparedness test" }, "answer": "B", "explanation": "" }, { "question": "You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?", "options": { "A": "Communications Management Plan", "B": "Resource Management Plan", "C": "Risk Management Plan", "D": "Stakeholder management strategy" }, "answer": "A", "explanation": "" }, { "question": "Which of the following levels of RAID provides security features that are availability, enhanced performance, and fault tolerance?", "options": { "A": "RAID-10", "B": "RAID-5", "C": "RAID-0", "D": "RAID-1" }, "answer": "A", "explanation": "" }, { "question": "Which of the following backup sites takes the longest recovery time?", "options": { "A": "Cold backup site", "B": "Hot backup site", "C": "Warm backup site", "D": "Mobile backup site" }, "answer": "A", "explanation": "" }, { "question": "Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?", "options": { "A": "Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps", "B": "Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system", "C": "Volatile data, file slack, registry, memory dumps, file system, system state backup, internet traces", "D": "Volatile data, file slack, file system, registry, memory dumps, system state backup, internet traces" }, "answer": "D", "explanation": "" }, { "question": "Which of the following defines the communication link between a Web server and Web applications?", "options": { "A": "IETF", "B": "Firewall", "C": "PGP", "D": "CGI" }, "answer": "D", "explanation": "" }, { "question": "Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?", "options": { "A": "Disaster Recovery Plan", "B": "Continuity Of Operations Plan", "C": "Business Continuity Plan", "D": "Contingency Plan" }, "answer": "D", "explanation": "" }, { "question": "Which of the following features of the Cisco MDS 9000 SAN Extension over IP Package help in implementing efficient FCIP-based business-continuity and disaster-recovery solutions?", "options": { "A": "FCIP write acceleration", "B": "IVR", "C": "FCIP compression", "D": "SAN extension tuner" }, "answer": "BC", "explanation": "" }, { "question": "Which of the following methods is a means of ensuring that system changes are approved before being implemented, and the implementation is complete and accurate?", "options": { "A": "Configuration identification", "B": "Configuration control", "C": "Configuration auditing", "D": "Documentation control" }, "answer": "D", "explanation": "" }, { "question": "Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?", "options": { "A": "The IT Service Continuity Manager", "B": "The Configuration Manager", "C": "The Supplier Manager", "D": "The Service Catalogue Manager" }, "answer": "C", "explanation": "" }, { "question": "Which of the following statements about a certification authority (CA) is true?", "options": { "A": "It is a non-profit organization that sets security standards for e-commerce.", "B": "It is a business-to-consumer (B2C) commerce model that is used for high-volume transactions.", "C": "It is a trusted third-party organization that issues digital certificates to create digital signatures and public key pairs.", "D": "It issues physical certificates that confirm the identity of entities." }, "answer": "C", "explanation": "" }, { "question": "BS 7799 is an internationally recognized ISM standard that provides high level, conceptual recommendations on enterprise security. BS 7799 is basically divided into three parts. Which of the following statements are true about BS 7799?", "options": { "A": "BS 7799 Part 3 was published in 2005, covering risk analysis and management.", "B": "BS 7799 Part 1 was a standard originally published as BS 7799 by the British Standards Institute (BSI) in 1995.", "C": "BS 7799 Part 2 was adopted by ISO as ISO/IEC 27001 in November 2005.", "D": "BS 7799 Part 1 was adopted by ISO as ISO/IEC 27001 in November 2005." }, "answer": "ABC", "explanation": "" }, { "question": "An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?", "options": { "A": "User password policy", "B": "Backup policy", "C": "Privacy policy", "D": "Network security policy" }, "answer": "C", "explanation": "" }, { "question": "Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?", "options": { "A": "Parallel test", "B": "Simulation test", "C": "Full-interruption test", "D": "Structured walk-through test" }, "answer": "C", "explanation": "" }, { "question": "Which of the following backup sites is the best way for rapid recovery if you do not need the full recovery temporarily?", "options": { "A": "Hot backup site", "B": "Cold backup site", "C": "Mobile backup site", "D": "Warm backup site" }, "answer": "C", "explanation": "" }, { "question": "Which of the following subphases are defined in the maintenance phase of the life cycle models?", "options": { "A": "Change control", "B": "Request control", "C": "Release control", "D": "Configuration control" }, "answer": "ABC", "explanation": "" }, { "question": "Which of the following best describes the identification, analysis, and ranking of risks?", "options": { "A": "Fixed-price contract", "B": "Design of experiments", "C": "Fast tracking", "D": "Plan Risk management" }, "answer": "D", "explanation": "" }, { "question": "Which of the following procedures is to reduce the risk to personnel, property, and other assets while minimizing work disorders in the event of an emergency?", "options": { "A": "Occupant Emergency Plan", "B": "Disaster Recovery Plan", "C": "Cyber Incident Response Plan", "D": "Crisis Communication Plan" }, "answer": "A", "explanation": "" }, { "question": "Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denial-of-service attacks, or unauthorized changes to system hardware, software, or data?", "options": { "A": "Cyber Incident Response Plan", "B": "Crisis Communication Plan", "C": "Occupant Emergency Plan", "D": "Disaster Recovery Plan" }, "answer": "A", "explanation": "" }, { "question": "Which of the following BCP teams assesses the damage of the disaster in order to provide the estimate of the time required to recover?", "options": { "A": "Emergency action team", "B": "Off-site storage team", "C": "Emergency management team", "D": "Damage assessment team" }, "answer": "D", "explanation": "" }, { "question": "Which of the following are common applications that help in replicating and protecting critical information at the time of disaster?", "options": { "A": "Asynchronous replication", "B": "Synchronous replication", "C": "Tape backup", "D": "Disk mirroring" }, "answer": "ABCD", "explanation": "" }, { "question": "Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?", "options": { "A": "To verify configuration records and correct any exceptions", "B": "To account for all IT assets", "C": "To provide precise information support to other ITIL disciplines", "D": "To provide a solid base only for Incident and Problem Management" }, "answer": "ABC", "explanation": "" }, { "question": "Which of the following plans provides procedures for recovering business operations immediately following a disaster?", "options": { "A": "Business recovery plan", "B": "Continuity of operation plan", "C": "Disaster recovery plan", "D": "Business continuity plan" }, "answer": "A", "explanation": "" }, { "question": "You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs). According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?", "options": { "A": "Configuration auditing", "B": "Configuration identification", "C": "Configuration status accounting", "D": "Configuration control" }, "answer": "B", "explanation": "" }, { "question": "You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control?", "options": { "A": "Risk audits", "B": "Qualitative risk analysis", "C": "Quantitative risk analysis", "D": "Requested changes" }, "answer": "D", "explanation": "" }, { "question": "Which of the following procedures can be broadly defined as the plan for the exchange of information before, during, or after a crisis event?", "options": { "A": "Occupant Emergency Plan", "B": "Crisis Communication Plan", "C": "Cyber Incident Response Plan", "D": "Disaster Recovery Plan" }, "answer": "B", "explanation": "" }, { "question": "Which of the following processes identifies the threats that can impact the business continuity of operations?", "options": { "A": "Business impact analysis", "B": "Function analysis", "C": "Requirement analysis", "D": "Risk analysis" }, "answer": "A", "explanation": "" }, { "question": "Which of the following measurements of a disaster recovery plan are aimed at avoiding an event from occurring?", "options": { "A": "Corrective measures", "B": "Detective measures", "C": "Preventive measures", "D": "Supportive measures" }, "answer": "C", "explanation": "" }, { "question": "Which of the following cryptographic system services ensures that the information will not be disclosed to any unauthorized person on a local network?", "options": { "A": "Non-repudiation", "B": "Confidentiality", "C": "Authentication", "D": "Integrity" }, "answer": "B", "explanation": "" }, { "question": "Which of the following cryptographic system services proves a user's identity?", "options": { "A": "Confidentiality", "B": "Non-repudiation", "C": "Integrity", "D": "Authentication" }, "answer": "D", "explanation": "" }, { "question": "The Incident handling process implemented in an enterprise is responsible to deal with all the incidents regarding the enterprise. Which of the following procedures will be involved by the preparation phase of the Incident handling process?", "options": { "A": "Setting up the initial position after an incident", "B": "Organizing a solution to remove an incident", "C": "Working with QA to validate security of the enterprise", "D": "Building up an incident response kit" }, "answer": "D", "explanation": "" }, { "question": "Which methodology is a method to analyze the involved tasks in completing a given project, especially the time needed to complete each task, and identifying the minimum time needed to complete the total project?", "options": { "A": "CPM", "B": "Gantt", "C": "PERT", "D": "FP" }, "answer": "C", "explanation": "" }, { "question": "Which of the following RAID levels provides fault tolerance?", "options": { "A": "RAID-5", "B": "RAID-1", "C": "RAID-10", "D": "RAID-0" }, "answer": "A", "explanation": "" }, { "question": "You are the project manager for a construction project. The project involves casting of a column in a very narrow space. Because of the lack of space, casting is highly dangerous. High technical skill will be required for casting that column. You decide to hire a local expert team for casting that column. Which of the following types of risk response are you following?", "options": { "A": "Transference", "B": "Mitigation", "C": "Avoidance", "D": "Acceptance" }, "answer": "A", "explanation": "" }, { "question": "Which of the following options is an activity of observing the content that appears on a computer monitor or watching what a user is typing?", "options": { "A": "Utility model", "B": "Copyright", "C": "Snooping", "D": "Patent" }, "answer": "C", "explanation": "" }, { "question": "Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?", "options": { "A": "Disaster Recovery Plan", "B": "Business Continuity Plan", "C": "Contingency Plan", "D": "Continuity of Operations Plan" }, "answer": "B", "explanation": "" }, { "question": "Which of the following elements of BCP process includes the areas of plan implementation, plan testing, and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?", "options": { "A": "Business impact assessment", "B": "Scope and plan initiation", "C": "Plan approval and implementation", "D": "Business continuity plan development" }, "answer": "D", "explanation": "" }, { "question": "Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?", "options": { "A": "MessenPass", "B": "Mail Pass View", "C": "Asterisk Logger", "D": "Access PassView" }, "answer": "A", "explanation": "" }, { "question": "Which of the following should the administrator ensure during the test of a disaster recovery plan?", "options": { "A": "Ensure that all client computers in the organization are shut down.", "B": "Ensure that each member of the disaster recovery team is aware of their responsibility.", "C": "Ensure that the plan works properly", "D": "Ensure that all the servers in the organization are shut down." }, "answer": "BC", "explanation": "" }, { "question": "Which of the following governance bodies provides management, operational, and technical controls to satisfy the security requirements?", "options": { "A": "Chief Information Security Officer", "B": "Senior Management", "C": "Business Unit Manager", "D": "Information Security Steering Committee" }, "answer": "B", "explanation": "" }, { "question": "Against which of the following does SSH provide protection?", "options": { "A": "Broadcast storm", "B": "Password sniffing", "C": "DoS attack", "D": "IP spoofing" }, "answer": "BD", "explanation": "" }, { "question": "A project plan includes the Work Breakdown Structure (WBS) and cost estimates. Which of the following are the parts of a project plan?", "options": { "A": "Risk identification", "B": "Project schedule", "C": "Risk analysis", "D": "Team members list", "E": "Security Threat" }, "answer": "ABCD", "explanation": "" }, { "question": "Which of the following statements is related to residual risks?", "options": { "A": "It is the probabilistic risk before implementing all security measures.", "B": "It is the probabilistic risk after implementing all security measures.", "C": "It can be considered as an indicator of threats coupled with vulnerability.", "D": "It is a weakness or lack of safeguard that can be exploited by a threat." }, "answer": "B", "explanation": "" }, { "question": "You work as a project manager for BlueWell Inc. You are working with your team members on the risk responses in the project. Which risk response will likely cause a project to use the procurement processes?", "options": { "A": "Mitigation", "B": "Sharing", "C": "Exploiting", "D": "Acceptance" }, "answer": "B", "explanation": "" }, { "question": "You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?", "options": { "A": "Snow", "B": "ImageHide", "C": "Blindside", "D": "Stealth" }, "answer": "D", "explanation": "" }, { "question": "Software Development Life Cycle (SDLC) is a logical process used by the programmers to develop software. Which SDLC phase meets the following audit objectives?System and data are validated.System meets all user requirements.System meets all control requirements.", "options": { "A": "Definition", "B": "Evaluation and acceptance", "C": "Initiation", "D": "Programming and training" }, "answer": "B", "explanation": "" }, { "question": "Mark works as a Network Administrator for NetTech Inc. Mark is testing the disaster recovery plan of the company. During the testing of the recovery plan, he finds that some servers have been restored with another server's data. What will Mark do to improve the disaster recovery plan?", "options": { "A": "Maintain a hard copy of the data stored on the server.", "B": "Remember which tape drive stores which server's data.", "C": "Implement the cluster server.", "D": "Maintain a printed tape backup report." }, "answer": "D", "explanation": "" }, { "question": "John, a novice web user, makes a new e-mail account and keeps his password as \"apple\", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?", "options": { "A": "Brute Force attack", "B": "Dictionary attack", "C": "Rule based attack", "D": "Hybrid attack" }, "answer": "ABD", "explanation": "" }, { "question": "Which of the following backup sites is a replica of the original site of an organization with full computer systems as well as near-complete backups of user data?", "options": { "A": "Hot backup site", "B": "Warm backup site", "C": "Mobile backup site", "D": "Cold backup site" }, "answer": "A", "explanation": "" }, { "question": "Organizations must assess the safety of their workplaces and consider the ability of a business to continue despite risk impact. When assessing business continuity risks, the HR Professional must consider several different types of disasters, their probability, and impact on an organization. What category of disaster is best described as acts of terrorism, major thefts, sabotage, or labor disputes?", "options": { "A": "Organized or deliberate disruptions", "B": "System failures", "C": "Environmental disasters", "D": "Serious information security incidents" }, "answer": "A", "explanation": "" }, { "question": "Which of the following command line tools are available in Helix Live acquisition tool on Windows?", "options": { "A": "netstat", "B": "whois", "C": "cab extractors", "D": "ipconfig" }, "answer": "ACD", "explanation": "" }, { "question": "Which of the following authorizes and documents all the changes in the IT Infrastructure and its components (Configuration Items) in order to maintain a minimum amount of interruptive effects upon the running operation?", "options": { "A": "The IT Security Manager", "B": "The Configuration Manager", "C": "The Change Manager", "D": "The Service Level Manager" }, "answer": "C", "explanation": "" }, { "question": "You work as a Network administrator for Infonet Inc. The company has 135 Windows XP Professional computers and twenty Windows 2003 Server computers. You want to specify the number of invalid logon attempts allowed before a user account is locked out. What will you do to accomplish the task?", "options": { "A": "Reset Account Lockout Counter After policy.", "B": "Set Account Lockout Threshold policy.", "C": "Set Account Lockout Duration policy.", "D": "Enforce Password Must Meet Complexity Requirements policy." }, "answer": "B", "explanation": "" }, { "question": "Which of the following techniques is an encryption method that uses public-key encryption to encrypt and digitally sign e-mail messages during communication between e-mail clients?", "options": { "A": "DES", "B": "IDEA", "C": "PGP", "D": "AES" }, "answer": "C", "explanation": "" }, { "question": "Joseph is a merchant. He lives in an area that is prone to natural disasters. What will he do to save his data from a disaster?", "options": { "A": "Restore the data.", "B": "E-mail the data.", "C": "Print the data.", "D": "Backup the data." }, "answer": "D", "explanation": "" }, { "question": "Which of the following BCP teams deals with the key decision making and guides recovery teams and business personnel?", "options": { "A": "Off-site storage team", "B": "Emergency management team", "C": "Damage assessment team", "D": "Emergency action team" }, "answer": "B", "explanation": "" }, { "question": "Which of the following procedures is designed to contain data, hardware, and software that can be critical for a business?", "options": { "A": "Disaster Recovery Plan", "B": "Crisis Communication Plan", "C": "Cyber Incident Response Plan", "D": "Occupant Emergency Plan" }, "answer": "A", "explanation": "" }, { "question": "You work as a security manager for SoftTech Inc. You along with your team are doing the disaster recovery for your project. Which of the following steps are performed by you for secure recovery based on the extent of the disaster and the organization's recovery ability?", "options": { "A": "Recover at the primary operating site", "B": "Recover to an alternate site for critical functions", "C": "Restore full system after a catastrophic loss", "D": "Restore full system at an alternate operating site" }, "answer": "ABC", "explanation": "" }, { "question": "You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you want to discuss it with your team members for getting appropriate responses of the disaster. In which of the following disaster recovery tests can this task be performed?", "options": { "A": "Parallel test", "B": "Full-interruption test", "C": "Structured walk-through test", "D": "Simulation test" }, "answer": "D", "explanation": "" }, { "question": "Which of the following plans is designed to protect critical business processes from natural or man-made failures or disasters and the resultant loss of capital due to the unavailability of normal business processes?", "options": { "A": "Contingency plan", "B": "Disaster recovery plan", "C": "Crisis communication plan", "D": "Business continuity plan" }, "answer": "D", "explanation": "" }, { "question": "Which of the following refers to the ability to ensure that the data is not modified or tampered with?", "options": { "A": "Integrity", "B": "Confidentiality", "C": "Availability", "D": "Non-repudiation" }, "answer": "A", "explanation": "" }, { "question": "Which of the following BCP teams handles financial arrangement, public relations, and media inquiries at the time of disaster recovery?", "options": { "A": "Applications team", "B": "Software team", "C": "Emergency management team", "D": "Off-site storage team" }, "answer": "C", "explanation": "" }, { "question": "Which of the following policies is related to the backup of data?", "options": { "A": "Backup policy", "B": "Network security policy", "C": "User password policy", "D": "Privacy policy" }, "answer": "A", "explanation": "" }, { "question": "ISO 17799 has two parts. The first part is an implementation guide with guidelines on how to build a comprehensive information security infrastructure and the second part is an auditing guide based on requirements that must be met for an organization to be deemed compliant with ISO 17799. What are the ISO 17799 domains?", "options": { "A": "Business continuity management", "B": "Information security policy for the organization", "C": "Personnel security", "D": "System architecture management", "E": "System development and maintenance" }, "answer": "ABCE", "explanation": "" }, { "question": "You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?", "options": { "A": "Containment", "B": "Preparation", "C": "Identification", "D": "Eradication" }, "answer": "B", "explanation": "" }, { "question": "A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?", "options": { "A": "Security law", "B": "Privacy law", "C": "Trademark law", "D": "Copyright law" }, "answer": "B", "explanation": "" }, { "question": "Which of the following concepts represent the three fundamental principles of information security?", "options": { "A": "Privacy", "B": "Availability", "C": "Integrity", "D": "Confidentiality" }, "answer": "BCD", "explanation": "" }, { "question": "Which of the following ensures that the confidentiality, integrity, and availability of the services are maintained to the levels approved on the Service Level Agreement (SLA)?", "options": { "A": "The IT Security Manager", "B": "The Change Manager", "C": "The Service Level Manager", "D": "The Configuration Manager" }, "answer": "A", "explanation": "" }, { "question": "You are analyzing accounting information of a company. Which of the following components of configuration management should you use that involves periodic checks to determine the consistency and completeness of accounting information, and to verify that all configuration management policies are being followed?", "options": { "A": "Configuration auditing", "B": "Configuration identification", "C": "Configuration control", "D": "Configuration status accounting" }, "answer": "A", "explanation": "" }, { "question": "Which of the following measurements of a disaster recovery plan are aimed at detecting unwanted events?", "options": { "A": "Detective measures", "B": "Corrective measures", "C": "Supportive measures", "D": "Preventive measures" }, "answer": "A", "explanation": "" }, { "question": "Which of the following stages of the business continuity planning life cycle focuses on the execution and testing of the individual solution designs developed?", "options": { "A": "Testing and acceptance stage", "B": "Solution design stage", "C": "Analysis stage", "D": "Implementation stage" }, "answer": "D", "explanation": "" }, { "question": "Which of the following types of agreement can be a legally binding formal or informal \"contract\"?", "options": { "A": "Non-disclosure agreement", "B": "Consulting agreement", "C": "Cooperative agreement", "D": "Service level agreement" }, "answer": "D", "explanation": "" }, { "question": "Which of the following tests ensures that the organization complies with the requirements of the disaster recovery plan?", "options": { "A": "Parallel test", "B": "Checklist test", "C": "Simulation test", "D": "Full-interruption test" }, "answer": "B", "explanation": "" }, { "question": "Which of the following contract types is described in the statement below?\"The seller is reimbursed for all allowable costs for performing the contract work, and receives a fixed payment calculated as a percentage for the initial estimated project costs.\"", "options": { "A": "Fixed Price Incentive Fee Contracts (FPIF)", "B": "Cost Plus Fixed Fee Contracts (CPFF)", "C": "Cost Plus Incentive Fee Contracts (CPIF)", "D": "Firm Fixed Price Contracts (FFP)" }, "answer": "B", "explanation": "" }, { "question": "Which of the following processes is required for effective business continuity and disaster-recovery planning?", "options": { "A": "Walk-through testing", "B": "Paper testing", "C": "Business impact assessment (BIA)", "D": "Preparedness testing" }, "answer": "C", "explanation": "" }, { "question": "Which of the following parts of BS 7799 covers risk analysis and management?", "options": { "A": "Part 2", "B": "Part 4", "C": "Part 1", "D": "Part 3" }, "answer": "D", "explanation": "" }, { "question": "Which of the following tests activates the total disaster recovery plan?", "options": { "A": "Full-interruption test", "B": "Structured walk-through test", "C": "Checklist test", "D": "Parallel test" }, "answer": "A", "explanation": "" }, { "question": "Which of the following documents helps disaster recovery team members in getting the alternate sites up and running?", "options": { "A": "Technical guide", "B": "Executive summary", "C": "Department-specific plan", "D": "Checklist" }, "answer": "A", "explanation": "" }, { "question": "Which of the following documents is necessary to continue the business in the event of disaster or emergency?", "options": { "A": "Vital record", "B": "Recourse record", "C": "Legal value", "D": "Fiscal value" }, "answer": "A", "explanation": "" }, { "question": "Which of the following scripts is included as a part of disaster recovery plan to confirm that everything is working as intended?", "options": { "A": "Base-functionality script", "B": "Recovery-plan script", "C": "SQL Server Index Defrag script", "D": "Transact-SQL script" }, "answer": "A", "explanation": "" }, { "question": "Which of the following documents provides a high-level view of the entire organization's disaster recovery efforts?", "options": { "A": "Checklists", "B": "Technical guides", "C": "Executive summary", "D": "Department-specific plans" }, "answer": "C", "explanation": "" }, { "question": "Which of the following processes helps to quantify the impact of potential threats to put a price or value on the cost of lost business functionality?", "options": { "A": "Risk Identification", "B": "Risk Analysis", "C": "Risk Reassessment", "D": "Risk Avoidance" }, "answer": "B", "explanation": "" }, { "question": "Which of the following administrative policy controls requires individuals or organizations to be engaged in good business practices relative to the organization's industry?", "options": { "A": "Separation of duties", "B": "Need to Know", "C": "Segregation of duties", "D": "Due care" }, "answer": "D", "explanation": "" }, { "question": "Which of the following processes is involved in identifying, measuring, and controlling events?", "options": { "A": "Incident Management", "B": "Response Management", "C": "Disaster Recovery", "D": "Risk Management" }, "answer": "D", "explanation": "" }, { "question": "Which of the following acts affects all public companies subject to US security laws?", "options": { "A": "Gramm-Leach-Bliley Act of 1999", "B": "Health Insurance Privacy and Accountability Act (HIPAA)", "C": "Sarbanes-Oxley Act of 2002", "D": "Federal Information Security Management Act" }, "answer": "C", "explanation": "" }, { "question": "Which of the following acts of information security governance affects the financial institutions?", "options": { "A": "Sarbanes-Oxley Act of 2002", "B": "Health Insurance Privacy and Accountability Act (HIPAA)", "C": "California Database Security Breach Information Act", "D": "Gramm-Leach-Bliley Act of 1999" }, "answer": "D", "explanation": "" }, { "question": "Which of the following modes of operation supports users with different clearances and data at various classification levels?", "options": { "A": "Dedicated", "B": "Limited Access", "C": "Compartmented", "D": "Multilevel mode" }, "answer": "D", "explanation": "" }, { "question": "Which of the following processes acts as a control measure that provides some amount of protection to the assets?", "options": { "A": "Risk", "B": "Countermeasure", "C": "Vulnerability", "D": "Safeguard" }, "answer": "D", "explanation": "" }, { "question": "In which of the following prototyping, a version of the system is built to check the requirements and is then discarded?", "options": { "A": "Evolutionary prototyping", "B": "Incremental prototyping", "C": "Project prototyping", "D": "Throw-away prototyping" }, "answer": "D", "explanation": "" }, { "question": "In which of the following prototyping, a prototype of a system is built and then evolves into the final system?", "options": { "A": "Project prototyping", "B": "Evolutionary prototyping", "C": "Throw-away prototyping", "D": "Incremental prototyping" }, "answer": "B", "explanation": "" }, { "question": "Which of the following terms best describes the presence of any potential event that causes an undesirable impact on the organization?", "options": { "A": "Threat", "B": "Risk", "C": "Vulnerability", "D": "Asset" }, "answer": "A", "explanation": "" }, { "question": "Which of the following DRP tests is plan distributed, and reviewed by the business units for its thoroughness and effectiveness?", "options": { "A": "Functional drill", "B": "Parallel test", "C": "Walk-through drill", "D": "Checklist review" }, "answer": "D", "explanation": "" }, { "question": "Which of the following SSE-CMM security engineering Process Areas (PA) specifies the security needs?", "options": { "A": "PA09", "B": "PA07", "C": "PA06", "D": "PA10" }, "answer": "D", "explanation": "" }, { "question": "Which of the following provides a means of predicting the outcome of the next software project conducted by an organization?", "options": { "A": "Software process capability", "B": "Software process maturity", "C": "Software process performance", "D": "Software security engineering" }, "answer": "A", "explanation": "" }, { "question": "Which of the following SSE-CMM security engineering Process Areas (PA) provides the security input?", "options": { "A": "PA06", "B": "PA09", "C": "PA07", "D": "PA08" }, "answer": "B", "explanation": "" }, { "question": "Which of the following terms describes the determination of the effect of changes to the information system on the security of the information system?", "options": { "A": "Verification", "B": "Authentication", "C": "Impact analysis", "D": "Validation analysis" }, "answer": "C", "explanation": "" }, { "question": "Which of the following processes helps the organization to identify appropriate controls for reducing or eliminating risk during the risk mitigation process?", "options": { "A": "Risk Assessment", "B": "Risk Acceptance", "C": "Risk Transference", "D": "Risk Identification" }, "answer": "A", "explanation": "" }, { "question": "Which of the following components in a TCB acts as the boundary that separates the TCB from the remainder of the system?", "options": { "A": "Abstraction", "B": "Trusted path", "C": "Trusted computer system", "D": "Security perimeter" }, "answer": "D", "explanation": "" }, { "question": "Which of the following TCB components is a hardware, firmware, and software element that implements the reference monitor concept?", "options": { "A": "Security perimeter", "B": "Security Kernel", "C": "Trusted computer system", "D": "Trusted path" }, "answer": "B", "explanation": "" }, { "question": "Which of the following terms describes the annually expected financial loss to an organization from a threat?", "options": { "A": "Annualized Loss Expectancy (ALE)", "B": "Annualized Rate of Occurrence (ARO)", "C": "Exposure factor (EF)", "D": "Single Loss Expectancy (SLE)" }, "answer": "A", "explanation": "" }, { "question": "Which of the following processes is NOT included in the risk mitigation?", "options": { "A": "Risk planning", "B": "Risk limitation", "C": "Risk identi?cation", "D": "Risk assumption" }, "answer": "C", "explanation": "" }, { "question": "Which of the following processes is used by organizations to set the risk tolerance, identify the potential risks, and prioritize the tolerance for risk?", "options": { "A": "Risk communication", "B": "Risk identification", "C": "Risk management", "D": "Risk analysis" }, "answer": "C", "explanation": "" }, { "question": "Which of the following security procedures is related to the SDLC's implementation?", "options": { "A": "Risk assessment", "B": "Media sanitation", "C": "Security accreditation", "D": "Information preservation" }, "answer": "C", "explanation": "" }, { "question": "Which of the following security procedures is NOT related to the SDLC's disposition?", "options": { "A": "Media sanitation", "B": "Information preservation", "C": "Hardware and software disposal", "D": "Security certification" }, "answer": "D", "explanation": "" }, { "question": "Which of the following individuals considers risk management in IT planning, budgeting, and meeting system performance requirements?", "options": { "A": "System and information owner", "B": "Chief information officer", "C": "Functional manager", "D": "Senior manager" }, "answer": "B", "explanation": "" }, { "question": "Which of the following values must ensure that the Maximum Tolerable Period of Disruption (MTPD) for each activity is not exceeded?", "options": { "A": "Recovery Plan Objective", "B": "Recovery Point Objective", "C": "Recovery Time Objective", "D": "Recovery Impact Objective" }, "answer": "C", "explanation": "" }, { "question": "Which of the following values specifies the acceptable latency of data that will be recovered?", "options": { "A": "Recovery Plan Objective", "B": "Recovery Point Objective", "C": "Recovery Time Objective", "D": "Recovery Target Objective" }, "answer": "B", "explanation": "" }, { "question": "Which of the following events occurs in a system when there is a TCB failure and the recovery procedures cannot return the system to a secure state?", "options": { "A": "Fault tolerance", "B": "Cold start", "C": "Fail-over", "D": "Fail-soft" }, "answer": "B", "explanation": "" }, { "question": "In which of the following scenarios is database backup transferred to a remote site in a bulk transfer fashion?", "options": { "A": "Remote journaling", "B": "Emergency response", "C": "Remote mirroring", "D": "Electronic vaulting" }, "answer": "D", "explanation": "" }, { "question": "Which of the following sites is a non-mainstream alternative to a traditional recovery site?", "options": { "A": "Warm site", "B": "Hot site", "C": "Mobile site", "D": "Cold site" }, "answer": "C", "explanation": "" }, { "question": "Which of the following is a compromise between hot and cold sites?", "options": { "A": "Mutual site", "B": "Warm site", "C": "Mobile site", "D": "Reciprocal site" }, "answer": "B", "explanation": "" }, { "question": "Which of the following types of storage requires some direct human action in order to make access to the storage media physically possible?", "options": { "A": "Near-line", "B": "Off-line", "C": "On-line", "D": "Far-line" }, "answer": "B", "explanation": "" }, { "question": "Which of the following steps has the goal to reduce the level of risk to the IT system and its data to an acceptable level?", "options": { "A": "Recommended Controls", "B": "Results Documentation", "C": "Impact Analysis", "D": "Risk Determination" }, "answer": "A", "explanation": "" }, { "question": "Who among the following has the ultimate responsibility for the protection of the organization's information?", "options": { "A": "Senior management", "B": "Application owner", "C": "User", "D": "Technology provider" }, "answer": "A", "explanation": "" }, { "question": "Which of the following Tier 1 policies will identify who is responsible for what?", "options": { "A": "Scope", "B": "Responsibilities", "C": "Compliance or Consequences", "D": "Topic" }, "answer": "B", "explanation": "" }, { "question": "Which of the following global (Tier 1) policies defines what specifically the policy is going to address?", "options": { "A": "Responsibilities", "B": "Scope", "C": "Compliance or Consequences", "D": "Topic" }, "answer": "D", "explanation": "" }, { "question": "Which of the following tasks is prioritized the most by the information security strategy?", "options": { "A": "Industry best practices", "B": "Technology plans and deliverables", "C": "Business goals and objectives", "D": "Security metrics" }, "answer": "C", "explanation": "" }, { "question": "Which of the following actions can be performed by using the principle of separation of duties?", "options": { "A": "Conducting background investigation", "B": "Developing job descriptions", "C": "Reducing the opportunity for fraud", "D": "Identifying critical positions" }, "answer": "C", "explanation": "" }, { "question": "Which of the following functions is performed by change control?", "options": { "A": "It tracks changes to system hardware, software, firmware, and documentation.", "B": "It maintains visibility of changes to the system.", "C": "It tracks and approves changes to system hardware, software, firmware, and documentation.", "D": "It ensures that changes to the system are approved." }, "answer": "C", "explanation": "" }, { "question": "Which of the following is a category of an automated Incident detection process?", "options": { "A": "Catastrophe Theory", "B": "Input detection", "C": "Control theory", "D": "OODA looping" }, "answer": "A", "explanation": "" }, { "question": "Which of the following workforces works to handle the incidents in an enterprise?", "options": { "A": "Z force", "B": "IEEE Software Development Team", "C": "Computer Emergency Response Team", "D": "Computer Forensics Team" }, "answer": "C", "explanation": "" }, { "question": "Which of the following sets of incident response practices is recommended by the CERT/CC?", "options": { "A": "Prepare, handle, and follow up", "B": "Prepare, handle, and notify", "C": "Prepare, notify, and follow up", "D": "Notify, handle, and follow up" }, "answer": "A", "explanation": "" }, { "question": "Which of the following processes helps the business units to understand the impact of a disruptive event?", "options": { "A": "Business impact assessment", "B": "Business continuity plan development", "C": "Scope and plan initiation", "D": "Plan approval and implementation" }, "answer": "A", "explanation": "" }, { "question": "Which of the following is the phase of Incident handling process in which the distinction between an event and an incident is made?", "options": { "A": "Identification phase", "B": "Preparation phase", "C": "Differential phase", "D": "Eradication phase" }, "answer": "A", "explanation": "" }, { "question": "Which of the following sources is the best for developing Recovery Time Objectives (RTO)?", "options": { "A": "Industry averages", "B": "Tape restore data", "C": "Business impact analysis", "D": "Past recovery test results" }, "answer": "C", "explanation": "" }, { "question": "Which of the following processes hides one set of IP addresses used for internal traffic only while exposing a second set of addresses to external traffic?", "options": { "A": "SIIT", "B": "NAT", "C": "NAT-PT", "D": "NAPT-PT" }, "answer": "B", "explanation": "" }, { "question": "Which of the following types of controls focuses on stopping a security breach from taking place in the first place?", "options": { "A": "Detection", "B": "Containment", "C": "Preventive", "D": "Recovery" }, "answer": "C", "explanation": "" }, { "question": "Which of the following types of control gives an instance of the audit log?", "options": { "A": "Preventive", "B": "Detection", "C": "Containment", "D": "Recovery" }, "answer": "B", "explanation": "" }, { "question": "Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms?", "options": { "A": "Behavior-based ID system", "B": "Network-based ID system", "C": "Signature-Based ID system", "D": "Host-based ID system" }, "answer": "D", "explanation": "" }, { "question": "Which of the following systems commonly resides on a discrete network segment and monitors the traffic on that network segment?", "options": { "A": "Host-Based ID system", "B": "Statistical Anomaly-Based ID system", "C": "Signature-Based ID system", "D": "Network-Based ID system" }, "answer": "D", "explanation": "" }, { "question": "Which of the following systems helps to detect the \"abuse of privileges\" attack that does not actually involve exploiting any security vulnerability?", "options": { "A": "Signature-Based ID system", "B": "Network-Based ID system", "C": "Statistical Anomaly-Based ID system", "D": "Host-Based ID system" }, "answer": "C", "explanation": "" }, { "question": "Which of the following sub-processes of IT Service Continuity Management is used to make sure that all members of IT staff with responsibilities for fighting disasters are aware of their exact duties?", "options": { "A": "ITSCM Training and Testing", "B": "ITSCM Support", "C": "ITSCM Review", "D": "Design Services for Continuity" }, "answer": "B", "explanation": "" }, { "question": "Which of the following is prepared by the business and serves as a starting point for producing the IT Service Continuity Strategy?", "options": { "A": "Business Continuity Strategy", "B": "Index of Disaster-Relevant Information", "C": "Disaster Invocation Guideline", "D": "Availability/ ITSCM/ Security Testing Schedule" }, "answer": "A", "explanation": "" }, { "question": "Which of the following statements are true about security risks?", "options": { "A": "They can be mitigated by reviewing and taking responsible actions based on possible risks.", "B": "They can be analyzed and measured by the risk analysis process.", "C": "They are considered an indicator of threats coupled with vulnerability.", "D": "They can be removed completely by taking proper actions." }, "answer": "ABC", "explanation": "" }, { "question": "Which of the following processes involves reducing the risk until it reaches a level acceptable to an organization?", "options": { "A": "Risk Mitigation", "B": "Risk Transference", "C": "Risk Avoidance", "D": "Risk Acceptance" }, "answer": "A", "explanation": "" }, { "question": "Which of the following classification schemes is considered to be of a personal nature and is intended for company use only?", "options": { "A": "Sensitive information", "B": "Private information", "C": "Public information", "D": "Confidential information" }, "answer": "B", "explanation": "" }, { "question": "In which of the following DRP tests does a business unit management meet to review the plan?", "options": { "A": "Simulation test", "B": "Parallel test", "C": "Structured walk-through test", "D": "Full-interruption test" }, "answer": "C", "explanation": "" }, { "question": "In risk analysis, which of the following can be identified as a consequence of a disaster?", "options": { "A": "Loss of stockholder confidence", "B": "Loss of competitive edge", "C": "Loss of operating capability", "D": "Loss of goodwill" }, "answer": "C", "explanation": "" }, { "question": "Which of the following processes involves taking measures to alter or improve the risk position of an asset throughout the company?", "options": { "A": "Risk transference", "B": "Risk avoidance", "C": "Risk reduction", "D": "Risk acceptance" }, "answer": "C", "explanation": "" }, { "question": "Which of the following plans provides procedures for disseminating status reports to personnel and the public?", "options": { "A": "Disaster Recovery Plan (DRP)", "B": "Crisis Communication Plan (CCP)", "C": "Emergency Response Plan (ERP)", "D": "Cyber Incident Response Plan (CIRP)" }, "answer": "B", "explanation": "" }, { "question": "In which of the following managing styles does the manager supervise subordinates very closely and give detail directions?", "options": { "A": "The coaching style", "B": "The supporting style", "C": "The delegating style", "D": "The directing style" }, "answer": "D", "explanation": "" }, { "question": "Which of the following TCB techniques involves viewing system components at a high level and ignoring or segregating its specific details?", "options": { "A": "Trusted computer system", "B": "Security perimeter", "C": "Abstraction", "D": "Trusted path" }, "answer": "C", "explanation": "" }, { "question": "Which of the following processes measures the maturity level of the security program?", "options": { "A": "Risk analysis", "B": "GAP analysis", "C": "Risk assessment", "D": "Risk mitigation" }, "answer": "B", "explanation": "" }, { "question": "Which of the following maturity levels of the software CMM focuses on competent people and heroics?", "options": { "A": "Initiating level", "B": "Defined level", "C": "Managed level", "D": "Repeatable level" }, "answer": "A", "explanation": "" }, { "question": "Which of the following individuals incorporates risk assessment in training programs for the organization's personnel?", "options": { "A": "Chief information officer", "B": "Information system security officer", "C": "Functional manager", "D": "Security awareness trainer" }, "answer": "D", "explanation": "" }, { "question": "Which of the following activities includes initiation, development and acquisition, implementation and installation, operational maintenance, and disposal?", "options": { "A": "Risk Management Framework", "B": "Risk Management Life Cycle", "C": "Capability Maturity Model (CMM)", "D": "System Development Life Cycle (SDLC)" }, "answer": "D", "explanation": "" }, { "question": "Which of the following is a duplicate of the original site of an organization, with fully working systems as well as near-complete backups of user data?", "options": { "A": "Hot site", "B": "Cold site", "C": "Warm site", "D": "Data site" }, "answer": "A", "explanation": "" }, { "question": "Which of the following system security policies is used to address specific issues of concern to the organization?", "options": { "A": "Informative policy", "B": "System-specific policy", "C": "Program policy", "D": "Issue-specific policy" }, "answer": "D", "explanation": "" }, { "question": "Which of the following statements are true about an APW (Air Pressurized Water) extinguisher?", "options": { "A": "It is a golden color extinguisher that is filled with about 9.5 gallons (approx. 39 liters) of ordinary tap water.", "B": "It uses water and pressure to stifle the heat of fire.", "C": "It is also known as a class C fire extinguisher.", "D": "It should never be used on grease fires, electrical fires, or class D fires." }, "answer": "BD", "explanation": "" }, { "question": "Which of the following phases is the first step towards creating a business continuity plan?", "options": { "A": "Business Impact Assessment", "B": "Plan Approval and Implementation", "C": "Business Continuity Plan Development", "D": "Scope and Plan Initiation" }, "answer": "D", "explanation": "" }, { "question": "Which of the following phases involves getting the final senior management signoff and creating enterprise-wide awareness of the plan?", "options": { "A": "Business Impact Assessment", "B": "Business Continuity Plan Development", "C": "Plan Approval and Implementation", "D": "Scope and Plan Initiation" }, "answer": "C", "explanation": "" } ]