When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always be taken into consideration?
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
What type of attack attempts to exploit the trust relationship between a user client based browser and server based websites forcing the submission of an authenticated request to a third party site?
How might the effectiveness of a security awareness program be effectively measured?
1) Employees are required to take an online multiple choice exam on security principles.
2) Employees are tested with social engineering techniques by an approved penetration tester.
3) Employees practice ethical hacking techniques on organisation systems.
4) No security vulnerabilities are reported during an audit.
5) Open source intelligence gathering is undertaken on staff social media profiles.
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
Which security framework impacts on organisations that accept credit cards, process credit card transactions, store relevant data or transmit credit card data?
Ensuring the correctness of data inputted to a system is an example of which facet of information security?
What Is the root cause as to why SMS messages are open to attackers and abuse?
What are the different methods that can be used as access controls?
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
How does the use of a "single sign-on" access control policy improve the security for an organisation implementing the policy?
What Is the PRIMARY reason for organisations obtaining outsourced managed security services?
A penetration tester undertaking a port scan of a client's network, discovers a host which responds to requests on TCP ports 22, 80, 443, 3306 and 8080.
What type of device has MOST LIKELY been discovered?
Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?
1. Intellectual Property Rights.
2. Protection of Organisational Records
3. Forensic recovery of data.
4. Data Deduplication.
5. Data Protection & Privacy.
Why might the reporting of security incidents that involve personal data differ from other types of security incident?
For which security-related reason SHOULD staff monitoring critical CCTV systems be rotated regularly during each work session?
Which of the following testing methodologies TYPICALLY involves code analysis in an offline environment without ever actually executing the code?
In order to maintain the currency of risk countermeasures, how often SHOULD an organisation review these risks?
Which of the following is NOT an information security specific vulnerability?
Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.
Which of the following is NOT a valid statement to include in an organisation's security policy?
What Is the PRIMARY security concern associated with the practice known as Bring Your Own Device (BYOD) that might affect a large organisation?
By what means SHOULD a cloud service provider prevent one client accessing data belonging to another in a shared server environment?
Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?