The BEST way to ensure that security settings on each platform are in compliance with information security policies and procedures is to:
perform penetration testing.
establish security baselines.
implement vendor default settings.
link policies to an independent standard.
establish security baselines.
A web-based business application is being migrated from test to production. Which of the following is the MOST important management signoff for this migration?
User
Network
Operations
Database
User
The BEST way to ensure that information security policies are followed is to:
distribute printed copies to all employees.
perform periodic reviews for compliance.
include escalating penalties for noncompliance.
establish an anonymous hotline to report policy abuses.
perform periodic reviews for compliance.
The MOST appropriate individual to determine the level of information security needed for a specific business application is the:
system developer.
information security manager.
steering committee.
system data owner.
system data owner.
Which of the following will MOST likely reduce the chances of an unauthorized individual gaining access to computing resources by pretending to be an authorized individual needing to have his or her password reset?
Performing reviews of password resets
Conducting security awareness programs
Increasing the frequency of password changes
Implementing automatic password syntax checking
Conducting security awareness programs
Which of the following is the MOST likely to change an organization’s culture to one that is more security conscious?
Adequate security policies and procedures
Periodic compliance reviews
Security steering committees
Security awareness campaigns
Security awareness campaigns
The BEST way to ensure that an external service provider complies with organizational security policies is to:
Explicitly include the service provider in the security policies.
Receive acknowledgment in writing stating the provider has read all policies.
Cross-reference to policies in the service level agreement
Perform periodic reviews of the service provider.
Perform periodic reviews of the service provider.
When an emergency security patch is received via electronic mail, the patch should FIRST be:
loaded onto an isolated test machine.
decompiled to check for malicious code.
validated to ensure its authenticity.
copied onto write-once media to prevent tampering.
validated to ensure its authenticity.
In a well-controlled environment, which of the following activities is MOST likely to lead to the introduction of weaknesses in security software?
Applying patches
Changing access rules
Upgrading hardware
Backing up files
Changing access rules
Which of the following is the BEST indicator that security awareness training has been effective?
Employees sign to acknowledge the security policy
More incidents are being reported
A majority of employees have completed training
No incidents have been reported in three months
More incidents are being reported
Which of the following metrics would be the MOST useful in measuring how well information security is monitoring violation logs?
Penetration attempts investigated
Violation log reports produced
Violation log entries
Frequency of corrective actions taken
Penetration attempts investigated
Which of the following change management activities would be a clear indicator that normal operational procedures require examination? A high percentage of:
similar change requests.
change request postponements.
canceled change requests.
emergency change requests.
emergency change requests.
Which of the following is the MOST important management signoff for migrating an order processing system from a test environment to a production environment?
User
Security
Operations
Database
User
Prior to having a third party perform an attack and penetration test against an organization, the MOST important action is to ensure that:
goals and objectives are clearly defined.
When a departmental system continues to be out of compliance with an information security policy’s password strength requirements, the BEST action to undertake is to:
submit the issue to the steering committee.
conduct an impact analysis to quantify the risks.
isolate the system from the rest of the network.
request a risk acceptance from senior management.
conduct an impact analysis to quantify the risks.
Which of the following is MOST important to the successful promotion of good security management practices?
Security metrics
Security baselines
Management support
Periodic training
Management support
Which of the following environments represents the GREATEST risk to organizational security?
Locally managed file server
Enterprise data warehouse
Load-balanced, web server cluster
Centrally managed data switch
Locally managed file server
Nonrepudiation can BEST be assured by using:
delivery path tracing.
reverse lookup translation.
out-of-hand channels.
digital signatures.
digital signatures.
Of the following, the BEST method for ensuring that temporary employees do not receive excessive access rights is:
mandatory access controls.
discretionary access controls.
lattice-based access controls.
role-based access controls.
role-based access controls.
Which of the following areas is MOST susceptible to the introduction of security weaknesses?
Database management
Tape backup management
Configuration management
Incident response management
Configuration management
Security policies should be aligned MOST closely with:
industry best practices.
organizational needs.
generally accepted standards.
local laws and regulations.
organizational needs.
The BEST way to determine if an anomaly-based intrusion detection system (IDS) is properly installed is to:
simulate an attack and review IDS performance.
use a honeypot to check for unusual activity.
audit the configuration of the IDS.
benchmark the IDS against a peer site.
simulate an attack and review IDS performance.
The BEST time to perform a penetration test is after:
an attempted penetration has occurred.
an audit has reported weaknesses in security controls.
various infrastructure changes are made.
a high turnover in systems staff.
various infrastructure changes are made.
Successful social engineering attacks can BEST be prevented through:
preemployment screening.
close monitoring of users’ access patterns.
periodic awareness training.
efficient termination procedures.
periodic awareness training.