1) Who should receive business continuity plan training in an organization?
Those with specific business continuity roles
First responders
Senior executives
Everyone
2) Formal acceptance of an evaluated system by management is known as what?
Authorization
Verification
Certification
Validation
3) What is the term for the act of secretly observing and recording someone's keystrokes on a computer?
Keystroking
Keylogging
Logkeying
Stokelogs
4) What best describes two-factor authentication?
A hard token and a smart card
A user name and a PIN
A password and a PIN
A PIN and a hard token
5) The elements of risk are?
Threats, assets and vulnerabilities
Risk and business impact analysis
Business impact analysis and mitigating controls
Natural disasters and man-made disasters
6) Which of the following is a security risk of wireless LANs?
War driving
Demonstrable insecure standards
Lack of physical access control
Implementation weakness
7) Which of the following best determines access of an individual?
Role
Clearance
Partnership with security team
Job rank or title
8) Tactical security plans are best used to do what?
Deploy new security technology
Enable enterprise security management
Establish high-level security policies
Reduce downtime
9) Which one is the most common security threat with IoT devices?
Logical Network Segmentation
Lack of device management
Lack of system updates against a new vulnerability
Backdoor
10) Single loss expectancy (SLE) is calculated by using?
Asset value and annualized rate of occurrence (ARO)
Asset value, local annual frequency estimate (LAFE), and standard annual frequency estimate (SAFE)
Asset value and exposure factor
Local annual frequency estimate and annualized rate of occurrence
11) In the OSI reference model, on which layer is Ethernet?
Layer 1 - Physical layer
Layer 2 - Data-link layer
Layer 3 - Network layer
Layer 4 - Transport layer
12) Before applying a software update to production systems, it is most important that
The patching is documented
The systems are backed up
Full information about the threat that the patch addresses is available
An independent third-party attests the validity of the patch
13) What is optimal placement for network based intrusion detection system (NIDS)?
External Service Provider
Network Operation Center (NOC)
Network segments with business critical systems (DMZ) and certain intranet segments
Network perimeter to alert network admins of suspicious traffic
14) A botnet can be characterized as?
An network used solely for internal communications
An automatic security alerting tool for corporate networks
A group of dispersed, compromised machines controlled remotely for illicit reasons
A type of virus
15) Security awareness training includes?
Legislated security compliance objectives
Security roles and responsibilities for staff
The high-level outcome of vulnerability assessments
Specialized curriculum assignments, coursework and an accredited institution
16) Business impact analysis is performed to best identify what?
Exposure to loss the organization faces
Impacts of a threat to the organization operations
Cost-effcient way to eliminate threats
Impacts of a risk to the organization
17) The running key cipher is based on what?
Modular math
Exponentiation
Substitution cipher
XOR math
18) If speed is preferred over resilience, which of the following RAID configurations is best?
Raid 1
Raid 10
Raid 5
Raid 0
19) When sensitive information is no longer critical but still within the scope of a record retention policy , that information is BEST?
Destroyed
Re-categorized
Degaussed
Released
20) When selecting a security testing method or tool, the practitioner needs to consider many different things, such as:
Surface and supported technology
Security roles and responsibilities for staff
Culture of the organization and likelihood of exposure
Local annual frequency estimate and standard annual frequency estimate