When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.
Answer : D
When outsourcing data processing, the original data owner has a legal duty of care to ensure that the third party is competent to process the data securely (1) and observes the same high standards as the data owner (2). This means that the third party must have the necessary skills, knowledge, and security measures in place to protect the data, and they must adhere to the same level of data protection and privacy standards as the original owner. Processing the data wherever it can be transferred (3) and archiving the data for the third party's own long-term usage (4) are not primary legal considerations and may, in fact, contravene data protection laws if done without proper safeguards and compliance with regulations.
How does the use of a "single sign-on" access control policy improve the security for an organisation implementing the policy?
Answer : C
Single sign-on (SSO) is an access control policy that allows users to authenticate with multiple applications and services by logging in only once. This approach improves security by reducing the number of credentials users must manage, which in turn decreases the likelihood of users writing down passwords. When users have to remember multiple complex passwords, they are more likely to write them down, use simple passwords, or repeat the same password across different services, all of which are security risks. SSO simplifies the login process, which can lead to stronger, unique passwords and reduce the risk of password-related breaches.
Which of the following is often the final stage in the information management lifecycle?
Answer : A
The final stage in the information management lifecycle is often disposal. This stage involves the secure deletion or destruction of information that is no longer needed or has reached the end of its retention period. Proper disposal is crucial to prevent unauthorized access or recovery of sensitive data. It ensures compliance with data protection regulations and organizational policies regarding the retention and destruction of data.
Why is it prudent for Third Parties to be contracted to meet specific security standards?
Answer : A
Contracting third parties to meet specific security standards is prudent because vulnerabilities within their networks can be exploited to gain unauthorized access to a client's environment. Third-party vendors often have access to an organization's sensitive data and systems, which can become a potential entry point for cyber attackers. By ensuring that third parties adhere to stringent security standards, an organization can better protect itself against the risk of data breaches and cyber attacks that may originate from less secure third-party networks. This proactive approach to third-party security helps maintain the integrity and confidentiality of the organization's data and systems.
When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles is considered BEST practice?
Answer : D
The best practice when handling and investigating digital evidence for use in a criminal cybercrime investigation is to ensure that digital devices are forensically ''clean'' before any investigation takes place. This means that the devices should be free from any potential contamination that could compromise the integrity of the evidence. It's crucial to maintain the original state of digital evidence as much as possible to ensure its admissibility in court. Altering digital evidence should be avoided unless it's absolutely necessary for the investigation, and even then, it should be done following strict protocols to document the changes made. While law enforcement often handles digital evidence, the principle of maintaining a forensically clean state applies universally to ensure the evidence remains untainted and reliable.
In a security governance framework, which of the following publications would be at the HIGHEST level?
Answer : C
In a security governance framework, the policy is typically at the highest level because it defines the overall direction and principles that govern the security posture of an organization. Policies are high-level statements that provide guidance to all members of an organization and form the foundation upon which standards, procedures, and guidelines are built. They are approved by the highest levels of management and are meant to be more stable over time, providing a consistent framework for security across the organization.
Which of the following is NOT an information security specific vulnerability?
Answer : C
In the context of information security vulnerabilities, we are typically referring to weaknesses that can be exploited by threats to compromise the confidentiality, integrity, or availability of an information system. Options A, B, and D all represent potential vulnerabilities:
A: Use of HTTP for an Apache web server could allow for interception of data due to lack of encryption.
B: An unpatched Windows operating system could have known security flaws that can be exploited.
D: An unlocked filing cabinet could lead to unauthorized physical access to sensitive documents.
Option C, however, refers to the storage of confidential data in a fire safe, which is a protective measure rather than a vulnerability. A fire safe is designed to protect physical assets from damage or destruction, particularly in the event of a fire, and does not inherently contain a weakness that could be exploited by a cyber threat. Therefore, it is not considered an information security specific vulnerability.
Which algorithm is a current specification for the encryption of electronic data established by NIST?
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
Answer : D
Defence in depth is a security concept that involves implementing multiple layers of security controls throughout an information system. The idea is that if one control fails or a vulnerability is exploited, other controls will provide redundancy and continue to protect the system. This approach is analogous to a physical fortress with multiple walls; if an attacker breaches one wall, additional barriers exist to stop them from progressing further. In the context of information security, this could include a combination of firewalls, intrusion detection systems, antivirus software, and strict access controls, among others. Defence in depth is designed to address security vulnerabilities not only in technology but also in processes and people, acknowledging that human error or negligence can often lead to security breaches.
Online retailers are the most at risk for the theft of electronic-based credit card data due to the nature of their business, which involves processing a large volume of transactions over the internet. This exposes them to various cyber threats, including hacking, phishing, and other forms of cyber-attacks that can compromise credit card information. Traditional market traders, mail delivery businesses, and agricultural producers typically do not handle credit card transactions to the same extent or in the same electronic manner as online retailers, making them less likely targets for this specific type of data theft.
What are the different methods that can be used as access controls?
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
Answer : C
Access controls are essential in information security for ensuring that resources are available to authorized users and protected from unauthorized access. The methods of access control can be categorized as follows:
Detective: These controls are designed to identify and record unauthorized access attempts. They do not prevent access but are useful for auditing and monitoring purposes.
Physical: Physical controls are tangible measures taken to protect assets, such as locks, fences, and security guards.
Preventive: Preventive controls are designed to stop unauthorized access before it happens. This includes mechanisms like passwords, biometric scans, and encryption.
The combination of detective, physical, and preventive controls provides a robust framework for managing access to sensitive information and systems. Reactive controls are not typically classified as access controls since they deal with responding to incidents after they occur, and virtual controls are not a recognized category in this context.
Which of the following describes a qualitative risk assessment approach?
Answer : A
A qualitative risk assessment approach is characterized by the subjective analysis of the likelihood of a risk occurring and its potential impact. This method relies on the judgment and experience of the assessor to estimate the severity of a risk. It does not use numerical data or statistical methods, which are typical of quantitative assessments. Instead, it may use descriptors like 'low', 'medium', or 'high' to rate both the likelihood of occurrence and the potential impact. This approach is useful when precise data is unavailable or when assessing complex, multifaceted risks where human insight is valuable.
Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?
Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?
Answer : B
The General Data Protection Regulation (GDPR) is a regulation that applies to all organizations operating within the EU and also to organizations outside of the EU that offer goods or services to, or monitor the behavior of, EU data subjects. It is designed to harmonize data privacy laws across Europe and to protect and empower all EU citizens' data privacy. The GDPR's relevance extends beyond geographical and sector-specific boundaries because it applies to any organization that processes the personal data of individuals within the EU, making it a global standard for data protection.
While other options like Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA) have significant impacts on specific sectors or regions, GDPR's broad scope makes it relevant to a wide range of organizations worldwide. It sets a precedent for data protection laws globally, influencing other regulations and becoming a de facto standard for many companies, even in countries without similar laws.
Which of the following is MOST LIKELY to be described as a consequential loss?
Answer : A
Consequential loss in the context of information security refers to secondary or indirect damage that occurs as a result of a primary event or incident. It is not the immediate direct loss, such as theft of money or service disruption, but rather the subsequent impact that may not be immediately apparent. Reputation damage is a prime example of consequential loss because it is a secondary effect that can occur after a security breach or incident. The loss of trust by customers, partners, and stakeholders can have long-term negative effects on a business's financial health and market position. This type of loss is often more significant and lasting than the immediate direct costs associated with an incident.
James is working with a software programme that completely obfuscates the entire source code, often in the form of a binary executable making it difficult to inspect, manipulate or reverse engineer the original source code.
What type of software programme is this?
Answer : B
The software program described is one that obfuscates the source code, making it difficult to inspect, manipulate, or reverse engineer. This is characteristic of proprietary source software, where the source code is not openly shared or available for public viewing or modification. Proprietary software companies often obfuscate their code to protect intellectual property and prevent unauthorized use or reproduction of their software. Unlike open-source software, where the source code is available for anyone to view, modify, and distribute, proprietary software keeps its source code a secret to maintain control over the software's functions and distribution.
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
What type of attack attempts to exploit the trust relationship between a user client based browser and server based websites forcing the submission of an authenticated request to a third party site?
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?
Answer : D
Developers should undergo Awareness Training to understand the security of the code they have written and how it can improve security defense while being attacked. This type of training educates developers on the importance of security considerations throughout the software development lifecycle (SDLC). It covers best practices for secure coding, common vulnerabilities and how to avoid them, and the impact of code security on the overall security posture of an application. By being aware of security principles and the potential threats, developers can write more secure code, which is crucial for defending against attacks.
Which of the following is an asymmetric encryption algorithm?
Answer : D
RSA (Rivest-Shamir-Adleman) is a widely accepted asymmetric encryption algorithm. Unlike symmetric algorithms, which use the same key for both encryption and decryption, asymmetric algorithms use a pair of keys -- a public key for encryption and a private key for decryption. This method allows for secure key exchange over an insecure channel without the need to share the private key. RSA operates on the principle that it is easy to multiply large prime numbers together to create a product, but it is hard to reverse the process, i.e., to factorize the product back into the original primes. This one-way function underpins the security of RSA.
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
Answer : D
Botnets are typically used by attackers for a variety of malicious activities, most commonly for:
Generating and distributing spam messages: Botnets can send out large volumes of spam emails to promote products or services, or to distribute malware.
Conducting DDoS attacks: Distributed Denial of Service (DDoS) attacks are often carried out using botnets to overwhelm a target's servers with traffic.
Scanning for system & application vulnerabilities: Botnets can be used to scan a large number of systems for vulnerabilities that can be exploited in further attacks.
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?
Answer : B
How might the effectiveness of a security awareness program be effectively measured?
1) Employees are required to take an online multiple choice exam on security principles.
2) Employees are tested with social engineering techniques by an approved penetration tester.
3) Employees practice ethical hacking techniques on organisation systems.
4) No security vulnerabilities are reported during an audit.
5) Open source intelligence gathering is undertaken on staff social media profiles.
Answer : D
The effectiveness of a security awareness program can be measured through various methods that assess both the knowledge and behavior of employees regarding security practices.
Online multiple choice exam on security principles: This method evaluates the employees' understanding of the security principles they have been taught. It's a direct measure of their knowledge and retention.
Testing with social engineering techniques by an approved penetration tester: This practical approach tests employees' reactions to real-life security threats, such as phishing or pretexting, which can indicate the effectiveness of the training in changing behavior.
Open source intelligence gathering on staff social media profiles: This method can reveal whether employees are adhering to security policies by not disclosing sensitive information publicly.
Option 3 is not a direct measure of a security awareness program's effectiveness, as practicing ethical hacking techniques is more about skills development rather than assessing awareness. Option 4, while important, does not directly measure the effectiveness of the security awareness program but rather the overall security posture of the organization.
Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?
When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles is considered BEST practice?
Answer : D
The best practice when handling and investigating digital evidence for use in a criminal cybercrime investigation is to ensure that digital devices are forensically ''clean'' before any investigation takes place. This means that the devices should be free from any potential contamination that could compromise the integrity of the evidence. It's crucial to maintain the original state of digital evidence as much as possible to ensure its admissibility in court. Altering digital evidence should be avoided unless it's absolutely necessary for the investigation, and even then, it should be done following strict protocols to document the changes made. While law enforcement often handles digital evidence, the principle of maintaining a forensically clean state applies universally to ensure the evidence remains untainted and reliable.
Which of the following describes a qualitative risk assessment approach?
Answer : A
A qualitative risk assessment approach is characterized by the subjective analysis of the likelihood of a risk occurring and its potential impact. This method relies on the judgment and experience of the assessor to estimate the severity of a risk. It does not use numerical data or statistical methods, which are typical of quantitative assessments. Instead, it may use descriptors like 'low', 'medium', or 'high' to rate both the likelihood of occurrence and the potential impact. This approach is useful when precise data is unavailable or when assessing complex, multifaceted risks where human insight is valuable.
Why might the reporting of security incidents that involve personal data differ from other types of security incident?
Answer : C
What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controls procedures during a critical emergency situation?
Which of the following is NOT a valid statement to include in an organisation's security policy?
Answer : B
An organization's security policy should be a reflection of its own security stance and principles, not tailored to third parties. While it may be informed by third-party requirements, the policy itself should not be amended to suit all third-party contractors. This is because the security policy is meant to establish a clear set of rules and expectations for the organization's members to maintain the confidentiality, integrity, and availability of its data. It should be defined, approved by management, and communicated to employees and relevant external parties. Amending the policy to suit all third-party contractors could lead to a dilution of the security standards and potentially compromise the organization's security posture.
As well as being permitted to access, create, modify and delete information, what right does an Information Owner NORMALLY have in regard to their information?
Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?
Answer : B
The General Data Protection Regulation (GDPR) is a regulation that applies to all organizations operating within the EU and also to organizations outside of the EU that offer goods or services to, or monitor the behavior of, EU data subjects. It is designed to harmonize data privacy laws across Europe and to protect and empower all EU citizens' data privacy. The GDPR's relevance extends beyond geographical and sector-specific boundaries because it applies to any organization that processes the personal data of individuals within the EU, making it a global standard for data protection.
While other options like Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA) have significant impacts on specific sectors or regions, GDPR's broad scope makes it relevant to a wide range of organizations worldwide. It sets a precedent for data protection laws globally, influencing other regulations and becoming a de facto standard for many companies, even in countries without similar laws.
Which membership based organisation produces international standards, which cover good practice for information assurance?
Answer : A
The British Standards Institution (BSI) is known for producing standards that cover good practices in various domains, including information assurance. BSI is the UK's national standards body and a founding member of the International Organization for Standardization (ISO). It contributes to the development of international standards through ISO, which provides frameworks and best practices for information security management systems (ISMS), such as the ISO/IEC 27000 series. These standards are designed to help organizations manage the security of assets such as financial information, intellectual property, employee details, and information entrusted by third parties.
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
Answer : B
The access control method described is Role-Based Access Control (RBAC). In RBAC, access permissions are based on the roles within an organization, and users are assigned to these roles based on their responsibilities and qualifications. Each role has a defined set of access permissions to perform certain operations. This method simplifies management and ensures that only authorized users can perform actions relevant to their role. For instance, 'Developers' can create and update files, 'Reviewers' can upload and update files, and 'Administrators' have the rights to upload, delete, and update files. This aligns with the RBAC model where permissions are grouped by role rather than by individual user, making it easier to manage and audit.
Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on information security?
Answer : B
The global pandemic has accelerated the trend of remote work, which inherently increases the risk of information security breaches due to insecure premises (A) and the need for additional tools like VPNs . There's also a higher likelihood of attackers exploiting vulnerabilities during such operational changes (D). However, the need for additional physical security at data centres and corporate headquarters (B) is less likely to be a direct result of a pandemic since the focus shifts to remote work and digital security rather than physical premises that are less occupied.
In a security governance framework, which of the following publications would be at the HIGHEST level?
Answer : C
In a security governance framework, the policy is typically at the highest level because it defines the overall direction and principles that govern the security posture of an organization. Policies are high-level statements that provide guidance to all members of an organization and form the foundation upon which standards, procedures, and guidelines are built. They are approved by the highest levels of management and are meant to be more stable over time, providing a consistent framework for security across the organization.
What term refers to the shared set of values within an organisation that determine how people are expected to behave in regard to information security?
Answer : B
ACode of Ethicstypically outlines the principles and moral values that guide the behavior of individuals within an organization but does not specifically address information security behaviors.
System Operating Proceduresare detailed written instructions to achieve uniformity of the performance of a specific function, which is more about the operational aspect rather than the underlying values or behaviors.
When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.
Answer : D
When outsourcing data processing, the original data owner has a legal duty of care to ensure that the third party is competent to process the data securely (1) and observes the same high standards as the data owner (2). This means that the third party must have the necessary skills, knowledge, and security measures in place to protect the data, and they must adhere to the same level of data protection and privacy standards as the original owner. Processing the data wherever it can be transferred (3) and archiving the data for the third party's own long-term usage (4) are not primary legal considerations and may, in fact, contravene data protection laws if done without proper safeguards and compliance with regulations.
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?
Answer : B
When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles is considered BEST practice?
Answer : D
The best practice when handling and investigating digital evidence for use in a criminal cybercrime investigation is to ensure that digital devices are forensically ''clean'' before any investigation takes place. This means that the devices should be free from any potential contamination that could compromise the integrity of the evidence. It's crucial to maintain the original state of digital evidence as much as possible to ensure its admissibility in court. Altering digital evidence should be avoided unless it's absolutely necessary for the investigation, and even then, it should be done following strict protocols to document the changes made. While law enforcement often handles digital evidence, the principle of maintaining a forensically clean state applies universally to ensure the evidence remains untainted and reliable.
Which three of the following characteristics form the AAA Triad in Information Security?
1. Authentication
2. Availability
3. Accounting
4. Asymmetry
5. Authorisation
Answer : D
The AAA Triad in Information Security stands for Authentication, Authorization (also known as Authorisation), and Accounting. These three components are fundamental to ensuring that access to systems is controlled and monitored:
Authenticationis the process of verifying the identity of a user or entity. It ensures that individuals are who they claim to be. This can involve methods such as passwords, biometrics, or tokens.
Authorizationdetermines what an authenticated user is allowed to do. It involves granting or denying rights to access resources and perform actions within a system based on the user's identity.
Accountingkeeps track of user activities. This includes logging when users log in and out, what actions they perform, and what resources they access. It's essential for auditing purposes and can also be used for billing or analyzing resource usage.
These principles are designed to protect information by managing potential risks and controlling access to data. They are part of a broader framework that includes physical, technical, and procedural controls to safeguard information assets.
In order to better improve the security culture within an organisation with a top down approach, which of the following actions at board level is the MOST effective?
Answer : A
Appointing a Chief Information Security Officer (CISO) is the most effective action at the board level to improve the security culture within an organization using a top-down approach. The CISO plays a critical role in establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO is responsible for leading the development and implementation of a security program across all aspects of the organization, which includes aligning security initiatives with business objectives, managing risk, and ensuring compliance with relevant laws and regulations. This strategic role not only helps in creating a robust security posture but also promotes a culture of security awareness throughout the organization. By having a dedicated executive responsible for security, it sends a clear message that the organization prioritizes information security and is committed to protecting its assets and stakeholders.
Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD) within the Information Security sphere?
Answer : B
The field of Information Security is dynamic and evolves rapidly, with new threats and technologies emerging regularly. Continual Professional Development (CPD) is crucial in this sphere to ensure that professionals stay up-to-date with the latest security trends, practices, and technologies. CPD enables information security professionals to maintain and enhance their knowledge and skills, which is vital for effectively protecting organizations against the ever-changing threat landscape. This ongoing learning process is not just about retaining credibility or meeting the requirements of professional bodies; it's about ensuring that professionals can respond to new challenges and remain effective in their roles.
Which of the following is an accepted strategic option for dealing with risk?
Answer : D
In the context of Information Security Management Principles, risk acceptance is a strategic option where an organization decides to accept the potential cost of a risk without taking any actions to mitigate it. This decision is typically made when the cost of mitigating the risk exceeds the cost of the risk's potential impact. Acceptance is part of the risk management process, which also includes risk identification, assessment, and treatment. When accepting a risk, it is crucial to document the decision and the rationale behind it, ensuring that it aligns with the organization's risk appetite and overall security policy.
A security analyst has been asked to provide a triple A service (AAA) for both wireless and remote access network services in an organization and must avoid using proprietary solutions.
What technology SHOULD they adapt?
Answer : B
The AAA service, which stands for Authentication, Authorization, and Accounting, is essential for managing user access to network resources. When it comes to providing AAA services for both wireless and remote access network services in a non-proprietary manner, RADIUS (Remote Authentication Dial-In User Service) is the most suitable technology.
TACACS+is a Cisco proprietary protocol and therefore does not meet the requirement of avoiding proprietary solutions.
OAuthis a framework for authorization and is not typically used for network access control in the same way that RADIUS is.
MS Access Databaseis not a network authentication protocol and would not provide the necessary AAA services for network security.
According to ISO/IEC 27000, which of the following is the definition of a vulnerability?
Answer : A
The term 'vulnerability' within the context of ISO/IEC 27000 refers to any weakness present in an asset or group of assets that could potentially be exploited by one or more threats. This definition aligns with the concept of vulnerability as a gap in protection efforts that, if not addressed, could allow a threat to compromise the confidentiality, integrity, or availability of an asset. It is important to note that vulnerabilities can be identified in various components of an organization's infrastructure, including hardware, software, processes, and even personnel. Effective information security management involves identifying these vulnerabilities through risk assessments and implementing appropriate controls to mitigate the risk of exploitation.
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.
Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?
Answer : B
The deployment of end-to-end Internet of Things (IoT) solutions significantly increases the attack surface compared to traditional IT systems. This is due to the vast number of connected devices, each potentially introducing new vulnerabilities. The heterogeneity of these devices, often with varying levels of security, can lead to more entry points for cyberattacks. Additionally, the complexity of managing and securing these numerous devices, especially when they use different communication protocols and standards, exacerbates the risk. Therefore, the expansion of the attack surface is considered the greatest risk because it amplifies the potential for unauthorized access and compromises the integrity, availability, and confidentiality of information systems.
When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?
Answer : A
When selecting a third-party digital forensics service provider, it is crucial to ensure that the company has the appropriate accreditations and the staff hold relevant certifications. This ensures that the service provider adheres to recognized standards and best practices in digital forensics, which is essential for the integrity and admissibility of evidence. Company accreditation provides assurance that the organization follows industry-recognized quality standards, while staff certification demonstrates that the individuals handling the forensic process are qualified and competent. This combination is vital for maintaining the credibility of the forensic investigation and the security of the data handled.
Which algorithm is a current specification for the encryption of electronic data established by NIST?
How does the use of a "single sign-on" access control policy improve the security for an organisation implementing the policy?
Answer : C
Single sign-on (SSO) is an access control policy that allows users to authenticate with multiple applications and services by logging in only once. This approach improves security by reducing the number of credentials users must manage, which in turn decreases the likelihood of users writing down passwords. When users have to remember multiple complex passwords, they are more likely to write them down, use simple passwords, or repeat the same password across different services, all of which are security risks. SSO simplifies the login process, which can lead to stronger, unique passwords and reduce the risk of password-related breaches.
Which of the following is NOT an information security specific vulnerability?
Answer : C
In the context of information security vulnerabilities, we are typically referring to weaknesses that can be exploited by threats to compromise the confidentiality, integrity, or availability of an information system. Options A, B, and D all represent potential vulnerabilities:
A: Use of HTTP for an Apache web server could allow for interception of data due to lack of encryption.
B: An unpatched Windows operating system could have known security flaws that can be exploited.
D: An unlocked filing cabinet could lead to unauthorized physical access to sensitive documents.
Option C, however, refers to the storage of confidential data in a fire safe, which is a protective measure rather than a vulnerability. A fire safe is designed to protect physical assets from damage or destruction, particularly in the event of a fire, and does not inherently contain a weakness that could be exploited by a cyber threat. Therefore, it is not considered an information security specific vulnerability.
Which of the following is MOST LIKELY to be described as a consequential loss?
Answer : A
Consequential loss in the context of information security refers to secondary or indirect damage that occurs as a result of a primary event or incident. It is not the immediate direct loss, such as theft of money or service disruption, but rather the subsequent impact that may not be immediately apparent. Reputation damage is a prime example of consequential loss because it is a secondary effect that can occur after a security breach or incident. The loss of trust by customers, partners, and stakeholders can have long-term negative effects on a business's financial health and market position. This type of loss is often more significant and lasting than the immediate direct costs associated with an incident.
What Is the KEY purpose of appending security classification labels to information?
Answer : A
The primary purpose of appending security classification labels to information is to guide the implementation of appropriate security controls. These labels indicate the level of sensitivity of the information and determine the extent and nature of the controls that need to be applied to protect it. For example, information classified as 'Confidential' will require stricter access controls compared to information classified as 'Public'. The classification labels help in ensuring that information is handled and protected in accordance with its importance to the organization, and in compliance with relevant legal and regulatory requirements.
Which of the following is an asymmetric encryption algorithm?
Answer : D
RSA (Rivest-Shamir-Adleman) is a widely accepted asymmetric encryption algorithm. Unlike symmetric algorithms, which use the same key for both encryption and decryption, asymmetric algorithms use a pair of keys -- a public key for encryption and a private key for decryption. This method allows for secure key exchange over an insecure channel without the need to share the private key. RSA operates on the principle that it is easy to multiply large prime numbers together to create a product, but it is hard to reverse the process, i.e., to factorize the product back into the original primes. This one-way function underpins the security of RSA.
What are the different methods that can be used as access controls?
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
Answer : C
Access controls are essential in information security for ensuring that resources are available to authorized users and protected from unauthorized access. The methods of access control can be categorized as follows:
Detective: These controls are designed to identify and record unauthorized access attempts. They do not prevent access but are useful for auditing and monitoring purposes.
Physical: Physical controls are tangible measures taken to protect assets, such as locks, fences, and security guards.
Preventive: Preventive controls are designed to stop unauthorized access before it happens. This includes mechanisms like passwords, biometric scans, and encryption.
The combination of detective, physical, and preventive controls provides a robust framework for managing access to sensitive information and systems. Reactive controls are not typically classified as access controls since they deal with responding to incidents after they occur, and virtual controls are not a recognized category in this context.
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?
Answer : D
Developers should undergo Awareness Training to understand the security of the code they have written and how it can improve security defense while being attacked. This type of training educates developers on the importance of security considerations throughout the software development lifecycle (SDLC). It covers best practices for secure coding, common vulnerabilities and how to avoid them, and the impact of code security on the overall security posture of an application. By being aware of security principles and the potential threats, developers can write more secure code, which is crucial for defending against attacks.
In a security governance framework, which of the following publications would be at the HIGHEST level?
Answer : C
In a security governance framework, the policy is typically at the highest level because it defines the overall direction and principles that govern the security posture of an organization. Policies are high-level statements that provide guidance to all members of an organization and form the foundation upon which standards, procedures, and guidelines are built. They are approved by the highest levels of management and are meant to be more stable over time, providing a consistent framework for security across the organization.
What Is the PRIMARY difference between DevOps and DevSecOps?
Answer : C
The primary difference between DevOps and DevSecOps lies in the integration of security practices. DevOps is a methodology that emphasizes collaboration between development and operations teams to automate the software development process, including continuous integration (CI) and continuous delivery (CD). However, DevOps does not inherently prioritize security as part of the development process.
DevSecOps, on the other hand, extends the DevOps principles by integrating security into every aspect of the software development lifecycle. This approach is often summarized by the term ''shift-left,'' which means incorporating security from the beginning and throughout the development process, rather than treating it as an afterthought or a final step before deployment. In DevSecOps, security is considered a shared responsibility among all team members, and it is addressed through continuous security processes that are as integral as CI/CD in the DevOps culture.
What form of attack against an employee has the MOST impact on their compliance with the organisation's "code of conduct"?
Answer : B
Social engineering attacks are designed to exploit human psychology and manipulate individuals into breaking normal security procedures and best practices. These attacks have the most impact on an employee's compliance with an organization's code of conduct because they directly target the employee's behavior and decision-making process. By using deception, persuasion, or influence, attackers can coerce employees into divulging confidential information, providing access to restricted areas, or performing actions that go against the company's policies and ethical standards. This form of attack can lead to violations of the code of conduct, as employees may unknowingly or unwillingly engage in activities that compromise the organization's values and principles.
Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?
Answer : B
The General Data Protection Regulation (GDPR) is a regulation that applies to all organizations operating within the EU and also to organizations outside of the EU that offer goods or services to, or monitor the behavior of, EU data subjects. It is designed to harmonize data privacy laws across Europe and to protect and empower all EU citizens' data privacy. The GDPR's relevance extends beyond geographical and sector-specific boundaries because it applies to any organization that processes the personal data of individuals within the EU, making it a global standard for data protection.
While other options like Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA) have significant impacts on specific sectors or regions, GDPR's broad scope makes it relevant to a wide range of organizations worldwide. It sets a precedent for data protection laws globally, influencing other regulations and becoming a de facto standard for many companies, even in countries without similar laws.
Which of the following describes a qualitative risk assessment approach?
Answer : A
A qualitative risk assessment approach is characterized by the subjective analysis of the likelihood of a risk occurring and its potential impact. This method relies on the judgment and experience of the assessor to estimate the severity of a risk. It does not use numerical data or statistical methods, which are typical of quantitative assessments. Instead, it may use descriptors like 'low', 'medium', or 'high' to rate both the likelihood of occurrence and the potential impact. This approach is useful when precise data is unavailable or when assessing complex, multifaceted risks where human insight is valuable.
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
Answer : C
The concept of a security culture within an organization emphasizes that security is not solely a technical issue but also a behavioral one. Appropriate behaviors are essential because they embody the organization's values and beliefs about security. These behaviors ensure that all members of the organization understand and adhere to security policies and procedures, thereby reducing risk and reinforcing the security regime. This includes following the 'need to know' principle, verifying IDs, and implementing access denial measures, but it is the appropriate behaviors that integrate these actions into a coherent and effective security culture.
Which of the following is MOST LIKELY to be described as a consequential loss?
Answer : A
Consequential loss in the context of information security refers to secondary or indirect damage that occurs as a result of a primary event or incident. It is not the immediate direct loss, such as theft of money or service disruption, but rather the subsequent impact that may not be immediately apparent. Reputation damage is a prime example of consequential loss because it is a secondary effect that can occur after a security breach or incident. The loss of trust by customers, partners, and stakeholders can have long-term negative effects on a business's financial health and market position. This type of loss is often more significant and lasting than the immediate direct costs associated with an incident.
What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controls procedures during a critical emergency situation?
Which of the following is an accepted strategic option for dealing with risk?
Answer : D
In the context of Information Security Management Principles, risk acceptance is a strategic option where an organization decides to accept the potential cost of a risk without taking any actions to mitigate it. This decision is typically made when the cost of mitigating the risk exceeds the cost of the risk's potential impact. Acceptance is part of the risk management process, which also includes risk identification, assessment, and treatment. When accepting a risk, it is crucial to document the decision and the rationale behind it, ensuring that it aligns with the organization's risk appetite and overall security policy.
Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?
1. Intellectual Property Rights.
2. Protection of Organisational Records
3. Forensic recovery of data.
4. Data Deduplication.
5. Data Protection & Privacy.
Answer : D
The ISO/IEC 27000 series, particularly ISO/IEC 27001, provides a framework for information security management systems (ISMS) that helps organizations secure their information assets. This series covers various aspects of information security, including the protection of organizational records and data protection & privacy, which are legal compliance requirements in many jurisdictions. Intellectual Property Rights (IPR) are also considered within the scope of information security as they pertain to the protection of proprietary information and assets. Forensic recovery of data and data deduplication are technical and operational considerations but are not directly addressed as compliance legal requirements within the ISO/IEC 27000 series.
Which cryptographic protocol preceded Transport Layer Security (TLS)?
Answer : C
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?
Answer : B
Which of the following describes a qualitative risk assessment approach?
Answer : A
A qualitative risk assessment approach is characterized by the subjective analysis of the likelihood of a risk occurring and its potential impact. This method relies on the judgment and experience of the assessor to estimate the severity of a risk. It does not use numerical data or statistical methods, which are typical of quantitative assessments. Instead, it may use descriptors like 'low', 'medium', or 'high' to rate both the likelihood of occurrence and the potential impact. This approach is useful when precise data is unavailable or when assessing complex, multifaceted risks where human insight is valuable.
The policies, processes, practices, and tools used to align the business value of information with the most appropriate and cost-effective infrastructure from the time information is conceived through its final disposition.
Which of the below business practices does this statement define?
Answer : A
The statement defines Information Lifecycle Management (ILM), which is a set of policies, processes, practices, and tools that manage the flow of an organization's information throughout its life cycle. ILM is concerned with aligning the business value of information with the most appropriate and cost-effective infrastructure from the moment the information is created until its final disposition. This includes how information is created, stored, used, archived, and eventually disposed of. An effective ILM strategy helps organizations manage their data in compliance with business requirements, regulatory obligations, and cost constraints.
Why have MOST European countries developed specific legislation that permits police and security services to monitor communications traffic for specific purposes, such as the detection of crime?
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
Answer : D
Botnets are typically used by attackers for a variety of malicious activities, most commonly for:
Generating and distributing spam messages: Botnets can send out large volumes of spam emails to promote products or services, or to distribute malware.
Conducting DDoS attacks: Distributed Denial of Service (DDoS) attacks are often carried out using botnets to overwhelm a target's servers with traffic.
Scanning for system & application vulnerabilities: Botnets can be used to scan a large number of systems for vulnerabilities that can be exploited in further attacks.
Which algorithm is a current specification for the encryption of electronic data established by NIST?
How does the use of a "single sign-on" access control policy improve the security for an organisation implementing the policy?
Answer : C
Single sign-on (SSO) is an access control policy that allows users to authenticate with multiple applications and services by logging in only once. This approach improves security by reducing the number of credentials users must manage, which in turn decreases the likelihood of users writing down passwords. When users have to remember multiple complex passwords, they are more likely to write them down, use simple passwords, or repeat the same password across different services, all of which are security risks. SSO simplifies the login process, which can lead to stronger, unique passwords and reduce the risk of password-related breaches.
What term refers to the shared set of values within an organisation that determine how people are expected to behave in regard to information security?
Answer : B
ACode of Ethicstypically outlines the principles and moral values that guide the behavior of individuals within an organization but does not specifically address information security behaviors.
System Operating Proceduresare detailed written instructions to achieve uniformity of the performance of a specific function, which is more about the operational aspect rather than the underlying values or behaviors.
How might the effectiveness of a security awareness program be effectively measured?
1) Employees are required to take an online multiple choice exam on security principles.
2) Employees are tested with social engineering techniques by an approved penetration tester.
3) Employees practice ethical hacking techniques on organisation systems.
4) No security vulnerabilities are reported during an audit.
5) Open source intelligence gathering is undertaken on staff social media profiles.
Answer : D
The effectiveness of a security awareness program can be measured through various methods that assess both the knowledge and behavior of employees regarding security practices.
Online multiple choice exam on security principles: This method evaluates the employees' understanding of the security principles they have been taught. It's a direct measure of their knowledge and retention.
Testing with social engineering techniques by an approved penetration tester: This practical approach tests employees' reactions to real-life security threats, such as phishing or pretexting, which can indicate the effectiveness of the training in changing behavior.
Open source intelligence gathering on staff social media profiles: This method can reveal whether employees are adhering to security policies by not disclosing sensitive information publicly.
Option 3 is not a direct measure of a security awareness program's effectiveness, as practicing ethical hacking techniques is more about skills development rather than assessing awareness. Option 4, while important, does not directly measure the effectiveness of the security awareness program but rather the overall security posture of the organization.
Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?
Answer : C
Static verification refers to the set of processes that analyze code without executing it to ensure that defined coding practices are being followed. This method involves reviewing the code to detect errors, enforce coding standards, and identify security vulnerabilities. It is a crucial part of the software development lifecycle and helps maintain code quality and reliability. Static verification can be performed manually through code reviews or automatically using static analysis tools.
What aspect of an employee's contract of employment Is designed to prevent the unauthorised release of confidential data to third parties even after an employee has left their employment?
Answer : B
Non-disclosure agreements (NDAs) are legal contracts that are designed to protect sensitive information. They are a critical part of an employee's contract of employment to ensure that confidential data is not released to unauthorized third parties. NDAs are specifically intended to prevent the disclosure of confidential information both during the period of employment and after the employee has left the organization. This is essential for maintaining the integrity and confidentiality of proprietary information which could include trade secrets, client data, and other types of sensitive information.
What Is the KEY purpose of appending security classification labels to information?
Answer : A
The primary purpose of appending security classification labels to information is to guide the implementation of appropriate security controls. These labels indicate the level of sensitivity of the information and determine the extent and nature of the controls that need to be applied to protect it. For example, information classified as 'Confidential' will require stricter access controls compared to information classified as 'Public'. The classification labels help in ensuring that information is handled and protected in accordance with its importance to the organization, and in compliance with relevant legal and regulatory requirements.
Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
Answer : B
The access control method described is Role-Based Access Control (RBAC). In RBAC, access permissions are based on the roles within an organization, and users are assigned to these roles based on their responsibilities and qualifications. Each role has a defined set of access permissions to perform certain operations. This method simplifies management and ensures that only authorized users can perform actions relevant to their role. For instance, 'Developers' can create and update files, 'Reviewers' can upload and update files, and 'Administrators' have the rights to upload, delete, and update files. This aligns with the RBAC model where permissions are grouped by role rather than by individual user, making it easier to manage and audit.
Why might the reporting of security incidents that involve personal data differ from other types of security incident?
Answer : C
What does a penetration test do that a Vulnerability Scan does NOT?
Answer : A
A penetration test, unlike a vulnerability scan, is an in-depth process where security professionals actively attempt to exploit vulnerabilities in a system. The goal is to simulate a real-world attack to understand how an attacker could exploit vulnerabilities and to determine the potential impact. This involves not just identifying vulnerabilities, as a scan does, but also attempting to exploit them to understand the full extent of the risk. Penetration tests are typically manual or semi-automated and involve a variety of tools and techniques to uncover and exploit security weaknesses, which can include common tools like Nmap, Nessus, and Metasploit.
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?
Answer : D
Developers should undergo Awareness Training to understand the security of the code they have written and how it can improve security defense while being attacked. This type of training educates developers on the importance of security considerations throughout the software development lifecycle (SDLC). It covers best practices for secure coding, common vulnerabilities and how to avoid them, and the impact of code security on the overall security posture of an application. By being aware of security principles and the potential threats, developers can write more secure code, which is crucial for defending against attacks.
What Is the PRIMARY security concern associated with the practice known as Bring Your Own Device (BYOD) that might affect a large organisation?
Answer : B
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?
Answer : B
Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?
Answer : B
The General Data Protection Regulation (GDPR) is a regulation that applies to all organizations operating within the EU and also to organizations outside of the EU that offer goods or services to, or monitor the behavior of, EU data subjects. It is designed to harmonize data privacy laws across Europe and to protect and empower all EU citizens' data privacy. The GDPR's relevance extends beyond geographical and sector-specific boundaries because it applies to any organization that processes the personal data of individuals within the EU, making it a global standard for data protection.
While other options like Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA) have significant impacts on specific sectors or regions, GDPR's broad scope makes it relevant to a wide range of organizations worldwide. It sets a precedent for data protection laws globally, influencing other regulations and becoming a de facto standard for many companies, even in countries without similar laws.
Which term describes the acknowledgement and acceptance of ownership of actions, decisions, policies and deliverables?
Answer : A
Accountability is the term that describes the acknowledgement and acceptance of ownership of actions, decisions, policies, and deliverables. It implies that an individual or organization is willing to take responsibility for their actions and the outcomes of those actions, and is answerable to the relevant stakeholders. This concept is fundamental in information security management, as it ensures that individuals and teams are aware of their roles and the expectations placed upon them, particularly in relation to the protection of information assets. Accountability cannot be delegated; while tasks can be assigned to others, the ultimate ownership and obligation to report and justify the outcomes remain with the accountable party.
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
Which three of the following characteristics form the AAA Triad in Information Security?
1. Authentication
2. Availability
3. Accounting
4. Asymmetry
5. Authorisation
Answer : D
The AAA Triad in Information Security stands for Authentication, Authorization (also known as Authorisation), and Accounting. These three components are fundamental to ensuring that access to systems is controlled and monitored:
Authenticationis the process of verifying the identity of a user or entity. It ensures that individuals are who they claim to be. This can involve methods such as passwords, biometrics, or tokens.
Authorizationdetermines what an authenticated user is allowed to do. It involves granting or denying rights to access resources and perform actions within a system based on the user's identity.
Accountingkeeps track of user activities. This includes logging when users log in and out, what actions they perform, and what resources they access. It's essential for auditing purposes and can also be used for billing or analyzing resource usage.
These principles are designed to protect information by managing potential risks and controlling access to data. They are part of a broader framework that includes physical, technical, and procedural controls to safeguard information assets.
Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?
1. Intellectual Property Rights.
2. Protection of Organisational Records
3. Forensic recovery of data.
4. Data Deduplication.
5. Data Protection & Privacy.
Answer : D
The ISO/IEC 27000 series, particularly ISO/IEC 27001, provides a framework for information security management systems (ISMS) that helps organizations secure their information assets. This series covers various aspects of information security, including the protection of organizational records and data protection & privacy, which are legal compliance requirements in many jurisdictions. Intellectual Property Rights (IPR) are also considered within the scope of information security as they pertain to the protection of proprietary information and assets. Forensic recovery of data and data deduplication are technical and operational considerations but are not directly addressed as compliance legal requirements within the ISO/IEC 27000 series.
The policies, processes, practices, and tools used to align the business value of information with the most appropriate and cost-effective infrastructure from the time information is conceived through its final disposition.
Which of the below business practices does this statement define?
Answer : A
The statement defines Information Lifecycle Management (ILM), which is a set of policies, processes, practices, and tools that manage the flow of an organization's information throughout its life cycle. ILM is concerned with aligning the business value of information with the most appropriate and cost-effective infrastructure from the moment the information is created until its final disposition. This includes how information is created, stored, used, archived, and eventually disposed of. An effective ILM strategy helps organizations manage their data in compliance with business requirements, regulatory obligations, and cost constraints.
Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?
Answer : A
ITIL (Information Technology Infrastructure Library) is a widely recognized framework that offers a comprehensive set of best practices for IT Service Management (ITSM). It assists organizations in aligning IT services with business goals, including security objectives. ITIL provides guidance on the entire service lifecycle, from service strategy and design to service transition, operation, and continual service improvement. By following ITIL's structured approach, organizations can enhance the quality of IT services, manage risk effectively, improve customer satisfaction, and ensure that IT and business strategies are in sync.
Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?
Answer : B
The deployment of end-to-end Internet of Things (IoT) solutions significantly increases the attack surface compared to traditional IT systems. This is due to the vast number of connected devices, each potentially introducing new vulnerabilities. The heterogeneity of these devices, often with varying levels of security, can lead to more entry points for cyberattacks. Additionally, the complexity of managing and securing these numerous devices, especially when they use different communication protocols and standards, exacerbates the risk. Therefore, the expansion of the attack surface is considered the greatest risk because it amplifies the potential for unauthorized access and compromises the integrity, availability, and confidentiality of information systems.
Which of the following describes a qualitative risk assessment approach?
Answer : A
A qualitative risk assessment approach is characterized by the subjective analysis of the likelihood of a risk occurring and its potential impact. This method relies on the judgment and experience of the assessor to estimate the severity of a risk. It does not use numerical data or statistical methods, which are typical of quantitative assessments. Instead, it may use descriptors like 'low', 'medium', or 'high' to rate both the likelihood of occurrence and the potential impact. This approach is useful when precise data is unavailable or when assessing complex, multifaceted risks where human insight is valuable.
Which standard deals with the implementation of business continuity?
Answer : C
The standard that deals specifically with the implementation of business continuity is ISO 22301, which is internationally recognized. It outlines the requirements for a business continuity management system (BCMS), which provides a framework for organizations to update, control, and deploy an effective BCMS that helps them to be prepared and respond effectively to disruptions. ISO/IEC 27001 is related to information security management systems (ISMS) and while it includes aspects of business continuity, it is not solely focused on it. COBIT is a framework for developing, implementing, monitoring, and improving IT governance and management practices, and BS5750 is a standard for quality management systems, now superseded by ISO 9000 series.
Which of the following is MOST LIKELY to be described as a consequential loss?
Answer : A
Consequential loss in the context of information security refers to secondary or indirect damage that occurs as a result of a primary event or incident. It is not the immediate direct loss, such as theft of money or service disruption, but rather the subsequent impact that may not be immediately apparent. Reputation damage is a prime example of consequential loss because it is a secondary effect that can occur after a security breach or incident. The loss of trust by customers, partners, and stakeholders can have long-term negative effects on a business's financial health and market position. This type of loss is often more significant and lasting than the immediate direct costs associated with an incident.
In a security governance framework, which of the following publications would be at the HIGHEST level?
Answer : C
In a security governance framework, the policy is typically at the highest level because it defines the overall direction and principles that govern the security posture of an organization. Policies are high-level statements that provide guidance to all members of an organization and form the foundation upon which standards, procedures, and guidelines are built. They are approved by the highest levels of management and are meant to be more stable over time, providing a consistent framework for security across the organization.
Which of the following is often the final stage in the information management lifecycle?
Answer : A
The final stage in the information management lifecycle is often disposal. This stage involves the secure deletion or destruction of information that is no longer needed or has reached the end of its retention period. Proper disposal is crucial to prevent unauthorized access or recovery of sensitive data. It ensures compliance with data protection regulations and organizational policies regarding the retention and destruction of data.
What term refers to the shared set of values within an organisation that determine how people are expected to behave in regard to information security?
Answer : B
ACode of Ethicstypically outlines the principles and moral values that guide the behavior of individuals within an organization but does not specifically address information security behaviors.
System Operating Proceduresare detailed written instructions to achieve uniformity of the performance of a specific function, which is more about the operational aspect rather than the underlying values or behaviors.
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?
Answer : B
Which of the following is an accepted strategic option for dealing with risk?
Answer : D
In the context of Information Security Management Principles, risk acceptance is a strategic option where an organization decides to accept the potential cost of a risk without taking any actions to mitigate it. This decision is typically made when the cost of mitigating the risk exceeds the cost of the risk's potential impact. Acceptance is part of the risk management process, which also includes risk identification, assessment, and treatment. When accepting a risk, it is crucial to document the decision and the rationale behind it, ensuring that it aligns with the organization's risk appetite and overall security policy.
Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?
Answer : C
Static verification refers to the set of processes that analyze code without executing it to ensure that defined coding practices are being followed. This method involves reviewing the code to detect errors, enforce coding standards, and identify security vulnerabilities. It is a crucial part of the software development lifecycle and helps maintain code quality and reliability. Static verification can be performed manually through code reviews or automatically using static analysis tools.
When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.
Answer : D
When outsourcing data processing, the original data owner has a legal duty of care to ensure that the third party is competent to process the data securely (1) and observes the same high standards as the data owner (2). This means that the third party must have the necessary skills, knowledge, and security measures in place to protect the data, and they must adhere to the same level of data protection and privacy standards as the original owner. Processing the data wherever it can be transferred (3) and archiving the data for the third party's own long-term usage (4) are not primary legal considerations and may, in fact, contravene data protection laws if done without proper safeguards and compliance with regulations.
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
Answer : B
The access control method described is Role-Based Access Control (RBAC). In RBAC, access permissions are based on the roles within an organization, and users are assigned to these roles based on their responsibilities and qualifications. Each role has a defined set of access permissions to perform certain operations. This method simplifies management and ensures that only authorized users can perform actions relevant to their role. For instance, 'Developers' can create and update files, 'Reviewers' can upload and update files, and 'Administrators' have the rights to upload, delete, and update files. This aligns with the RBAC model where permissions are grouped by role rather than by individual user, making it easier to manage and audit.
You are undertaking a qualitative risk assessment of a likely security threat to an information system.
What is the MAIN issue with this type of risk assessment?
Answer : A
The main issue with qualitative risk assessments is their inherent subjectivity. Unlike quantitative assessments that use numerical data, qualitative assessments rely on the judgment and experience of the assessors to estimate risks. This can lead to inconsistencies if the criteria for ranking and categorizing risks are not clearly defined and agreed upon by all stakeholders involved in the assessment process. The subjective nature of this method can also influence the prioritization of risks, potentially affecting the decision-making process regarding which security controls to implement.
What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controls procedures during a critical emergency situation?
Which of the following is NOT considered to be a form of computer misuse?
Answer : A
The term 'computer misuse' typically refers to activities that are illegal or unauthorized and involve a computer system. This includes illegal interception of information, illegal access to computer systems, and downloading of pirated software, as these actions are unauthorized and often involve breaching security measures. However, the illegal retention of personal data, while a serious privacy concern and potentially a legal issue, is not typically classified under the scope of 'computer misuse'. Instead, it falls under data protection and privacy regulations, which deal with the proper handling and storage of personal information.
Which of the following types of organisation could be considered the MOST at risk from the theft of electronic based credit card data?
Answer : A
Online retailers are the most at risk for the theft of electronic-based credit card data due to the nature of their business, which involves processing a large volume of transactions over the internet. This exposes them to various cyber threats, including hacking, phishing, and other forms of cyber-attacks that can compromise credit card information. Traditional market traders, mail delivery businesses, and agricultural producers typically do not handle credit card transactions to the same extent or in the same electronic manner as online retailers, making them less likely targets for this specific type of data theft.
Which of the following is NOT a valid statement to include in an organisation's security policy?
Answer : B
An organization's security policy should be a reflection of its own security stance and principles, not tailored to third parties. While it may be informed by third-party requirements, the policy itself should not be amended to suit all third-party contractors. This is because the security policy is meant to establish a clear set of rules and expectations for the organization's members to maintain the confidentiality, integrity, and availability of its data. It should be defined, approved by management, and communicated to employees and relevant external parties. Amending the policy to suit all third-party contractors could lead to a dilution of the security standards and potentially compromise the organization's security posture.
What are the different methods that can be used as access controls?
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
Answer : C
Access controls are essential in information security for ensuring that resources are available to authorized users and protected from unauthorized access. The methods of access control can be categorized as follows:
Detective: These controls are designed to identify and record unauthorized access attempts. They do not prevent access but are useful for auditing and monitoring purposes.
Physical: Physical controls are tangible measures taken to protect assets, such as locks, fences, and security guards.
Preventive: Preventive controls are designed to stop unauthorized access before it happens. This includes mechanisms like passwords, biometric scans, and encryption.
The combination of detective, physical, and preventive controls provides a robust framework for managing access to sensitive information and systems. Reactive controls are not typically classified as access controls since they deal with responding to incidents after they occur, and virtual controls are not a recognized category in this context.
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
Answer : D
Defence in depth is a security concept that involves implementing multiple layers of security controls throughout an information system. The idea is that if one control fails or a vulnerability is exploited, other controls will provide redundancy and continue to protect the system. This approach is analogous to a physical fortress with multiple walls; if an attacker breaches one wall, additional barriers exist to stop them from progressing further. In the context of information security, this could include a combination of firewalls, intrusion detection systems, antivirus software, and strict access controls, among others. Defence in depth is designed to address security vulnerabilities not only in technology but also in processes and people, acknowledging that human error or negligence can often lead to security breaches.
Online retailers are the most at risk for the theft of electronic-based credit card data due to the nature of their business, which involves processing a large volume of transactions over the internet. This exposes them to various cyber threats, including hacking, phishing, and other forms of cyber-attacks that can compromise credit card information. Traditional market traders, mail delivery businesses, and agricultural producers typically do not handle credit card transactions to the same extent or in the same electronic manner as online retailers, making them less likely targets for this specific type of data theft.
In order to better improve the security culture within an organisation with a top down approach, which of the following actions at board level is the MOST effective?
Answer : A
Appointing a Chief Information Security Officer (CISO) is the most effective action at the board level to improve the security culture within an organization using a top-down approach. The CISO plays a critical role in establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO is responsible for leading the development and implementation of a security program across all aspects of the organization, which includes aligning security initiatives with business objectives, managing risk, and ensuring compliance with relevant laws and regulations. This strategic role not only helps in creating a robust security posture but also promotes a culture of security awareness throughout the organization. By having a dedicated executive responsible for security, it sends a clear message that the organization prioritizes information security and is committed to protecting its assets and stakeholders.
According to ISO/IEC 27000, which of the following is the definition of a vulnerability?
Answer : A
The term 'vulnerability' within the context of ISO/IEC 27000 refers to any weakness present in an asset or group of assets that could potentially be exploited by one or more threats. This definition aligns with the concept of vulnerability as a gap in protection efforts that, if not addressed, could allow a threat to compromise the confidentiality, integrity, or availability of an asset. It is important to note that vulnerabilities can be identified in various components of an organization's infrastructure, including hardware, software, processes, and even personnel. Effective information security management involves identifying these vulnerabilities through risk assessments and implementing appropriate controls to mitigate the risk of exploitation.
What term refers to the shared set of values within an organisation that determine how people are expected to behave in regard to information security?
Answer : B
ACode of Ethicstypically outlines the principles and moral values that guide the behavior of individuals within an organization but does not specifically address information security behaviors.
System Operating Proceduresare detailed written instructions to achieve uniformity of the performance of a specific function, which is more about the operational aspect rather than the underlying values or behaviors.
Which three of the following characteristics form the AAA Triad in Information Security?
1. Authentication
2. Availability
3. Accounting
4. Asymmetry
5. Authorisation
Answer : D
The AAA Triad in Information Security stands for Authentication, Authorization (also known as Authorisation), and Accounting. These three components are fundamental to ensuring that access to systems is controlled and monitored:
Authenticationis the process of verifying the identity of a user or entity. It ensures that individuals are who they claim to be. This can involve methods such as passwords, biometrics, or tokens.
Authorizationdetermines what an authenticated user is allowed to do. It involves granting or denying rights to access resources and perform actions within a system based on the user's identity.
Accountingkeeps track of user activities. This includes logging when users log in and out, what actions they perform, and what resources they access. It's essential for auditing purposes and can also be used for billing or analyzing resource usage.
These principles are designed to protect information by managing potential risks and controlling access to data. They are part of a broader framework that includes physical, technical, and procedural controls to safeguard information assets.
Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on information security?
Answer : B
The global pandemic has accelerated the trend of remote work, which inherently increases the risk of information security breaches due to insecure premises (A) and the need for additional tools like VPNs . There's also a higher likelihood of attackers exploiting vulnerabilities during such operational changes (D). However, the need for additional physical security at data centres and corporate headquarters (B) is less likely to be a direct result of a pandemic since the focus shifts to remote work and digital security rather than physical premises that are less occupied.
Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?
Answer : B
The General Data Protection Regulation (GDPR) is a regulation that applies to all organizations operating within the EU and also to organizations outside of the EU that offer goods or services to, or monitor the behavior of, EU data subjects. It is designed to harmonize data privacy laws across Europe and to protect and empower all EU citizens' data privacy. The GDPR's relevance extends beyond geographical and sector-specific boundaries because it applies to any organization that processes the personal data of individuals within the EU, making it a global standard for data protection.
While other options like Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA) have significant impacts on specific sectors or regions, GDPR's broad scope makes it relevant to a wide range of organizations worldwide. It sets a precedent for data protection laws globally, influencing other regulations and becoming a de facto standard for many companies, even in countries without similar laws.
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
Answer : C
The concept of a security culture within an organization emphasizes that security is not solely a technical issue but also a behavioral one. Appropriate behaviors are essential because they embody the organization's values and beliefs about security. These behaviors ensure that all members of the organization understand and adhere to security policies and procedures, thereby reducing risk and reinforcing the security regime. This includes following the 'need to know' principle, verifying IDs, and implementing access denial measures, but it is the appropriate behaviors that integrate these actions into a coherent and effective security culture.
Which of the following is NOT considered to be a form of computer misuse?
Answer : A
The term 'computer misuse' typically refers to activities that are illegal or unauthorized and involve a computer system. This includes illegal interception of information, illegal access to computer systems, and downloading of pirated software, as these actions are unauthorized and often involve breaching security measures. However, the illegal retention of personal data, while a serious privacy concern and potentially a legal issue, is not typically classified under the scope of 'computer misuse'. Instead, it falls under data protection and privacy regulations, which deal with the proper handling and storage of personal information.
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?
Answer : D
Developers should undergo Awareness Training to understand the security of the code they have written and how it can improve security defense while being attacked. This type of training educates developers on the importance of security considerations throughout the software development lifecycle (SDLC). It covers best practices for secure coding, common vulnerabilities and how to avoid them, and the impact of code security on the overall security posture of an application. By being aware of security principles and the potential threats, developers can write more secure code, which is crucial for defending against attacks.
What are the different methods that can be used as access controls?
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
Answer : C
Access controls are essential in information security for ensuring that resources are available to authorized users and protected from unauthorized access. The methods of access control can be categorized as follows:
Detective: These controls are designed to identify and record unauthorized access attempts. They do not prevent access but are useful for auditing and monitoring purposes.
Physical: Physical controls are tangible measures taken to protect assets, such as locks, fences, and security guards.
Preventive: Preventive controls are designed to stop unauthorized access before it happens. This includes mechanisms like passwords, biometric scans, and encryption.
The combination of detective, physical, and preventive controls provides a robust framework for managing access to sensitive information and systems. Reactive controls are not typically classified as access controls since they deal with responding to incidents after they occur, and virtual controls are not a recognized category in this context.
Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?
1. Intellectual Property Rights.
2. Protection of Organisational Records
3. Forensic recovery of data.
4. Data Deduplication.
5. Data Protection & Privacy.
Answer : D
The ISO/IEC 27000 series, particularly ISO/IEC 27001, provides a framework for information security management systems (ISMS) that helps organizations secure their information assets. This series covers various aspects of information security, including the protection of organizational records and data protection & privacy, which are legal compliance requirements in many jurisdictions. Intellectual Property Rights (IPR) are also considered within the scope of information security as they pertain to the protection of proprietary information and assets. Forensic recovery of data and data deduplication are technical and operational considerations but are not directly addressed as compliance legal requirements within the ISO/IEC 27000 series.
Why might the reporting of security incidents that involve personal data differ from other types of security incident?
Answer : C
Which of the following is NOT a valid statement to include in an organisation's security policy?
Answer : B
An organization's security policy should be a reflection of its own security stance and principles, not tailored to third parties. While it may be informed by third-party requirements, the policy itself should not be amended to suit all third-party contractors. This is because the security policy is meant to establish a clear set of rules and expectations for the organization's members to maintain the confidentiality, integrity, and availability of its data. It should be defined, approved by management, and communicated to employees and relevant external parties. Amending the policy to suit all third-party contractors could lead to a dilution of the security standards and potentially compromise the organization's security posture.
Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.
As well as being permitted to access, create, modify and delete information, what right does an Information Owner NORMALLY have in regard to their information?
What aspect of an employee's contract of employment Is designed to prevent the unauthorised release of confidential data to third parties even after an employee has left their employment?
Answer : B
Non-disclosure agreements (NDAs) are legal contracts that are designed to protect sensitive information. They are a critical part of an employee's contract of employment to ensure that confidential data is not released to unauthorized third parties. NDAs are specifically intended to prevent the disclosure of confidential information both during the period of employment and after the employee has left the organization. This is essential for maintaining the integrity and confidentiality of proprietary information which could include trade secrets, client data, and other types of sensitive information.
Which membership based organisation produces international standards, which cover good practice for information assurance?
Answer : A
The British Standards Institution (BSI) is known for producing standards that cover good practices in various domains, including information assurance. BSI is the UK's national standards body and a founding member of the International Organization for Standardization (ISO). It contributes to the development of international standards through ISO, which provides frameworks and best practices for information security management systems (ISMS), such as the ISO/IEC 27000 series. These standards are designed to help organizations manage the security of assets such as financial information, intellectual property, employee details, and information entrusted by third parties.
What Is the KEY purpose of appending security classification labels to information?
Answer : A
The primary purpose of appending security classification labels to information is to guide the implementation of appropriate security controls. These labels indicate the level of sensitivity of the information and determine the extent and nature of the controls that need to be applied to protect it. For example, information classified as 'Confidential' will require stricter access controls compared to information classified as 'Public'. The classification labels help in ensuring that information is handled and protected in accordance with its importance to the organization, and in compliance with relevant legal and regulatory requirements.
What Is the PRIMARY security concern associated with the practice known as Bring Your Own Device (BYOD) that might affect a large organisation?
Answer : B
Which of the following is an asymmetric encryption algorithm?
Answer : D
RSA (Rivest-Shamir-Adleman) is a widely accepted asymmetric encryption algorithm. Unlike symmetric algorithms, which use the same key for both encryption and decryption, asymmetric algorithms use a pair of keys -- a public key for encryption and a private key for decryption. This method allows for secure key exchange over an insecure channel without the need to share the private key. RSA operates on the principle that it is easy to multiply large prime numbers together to create a product, but it is hard to reverse the process, i.e., to factorize the product back into the original primes. This one-way function underpins the security of RSA.
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
Answer : C
The concept of a security culture within an organization emphasizes that security is not solely a technical issue but also a behavioral one. Appropriate behaviors are essential because they embody the organization's values and beliefs about security. These behaviors ensure that all members of the organization understand and adhere to security policies and procedures, thereby reducing risk and reinforcing the security regime. This includes following the 'need to know' principle, verifying IDs, and implementing access denial measures, but it is the appropriate behaviors that integrate these actions into a coherent and effective security culture.
When securing a wireless network, which of the following is NOT best practice?
According to ISO/IEC 27000, which of the following is the definition of a vulnerability?
Answer : A
The term 'vulnerability' within the context of ISO/IEC 27000 refers to any weakness present in an asset or group of assets that could potentially be exploited by one or more threats. This definition aligns with the concept of vulnerability as a gap in protection efforts that, if not addressed, could allow a threat to compromise the confidentiality, integrity, or availability of an asset. It is important to note that vulnerabilities can be identified in various components of an organization's infrastructure, including hardware, software, processes, and even personnel. Effective information security management involves identifying these vulnerabilities through risk assessments and implementing appropriate controls to mitigate the risk of exploitation.
A security analyst has been asked to provide a triple A service (AAA) for both wireless and remote access network services in an organization and must avoid using proprietary solutions.
What technology SHOULD they adapt?
Answer : B
The AAA service, which stands for Authentication, Authorization, and Accounting, is essential for managing user access to network resources. When it comes to providing AAA services for both wireless and remote access network services in a non-proprietary manner, RADIUS (Remote Authentication Dial-In User Service) is the most suitable technology.
TACACS+is a Cisco proprietary protocol and therefore does not meet the requirement of avoiding proprietary solutions.
OAuthis a framework for authorization and is not typically used for network access control in the same way that RADIUS is.
MS Access Databaseis not a network authentication protocol and would not provide the necessary AAA services for network security.
As well as being permitted to access, create, modify and delete information, what right does an Information Owner NORMALLY have in regard to their information?
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.
Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on information security?
Answer : B
The global pandemic has accelerated the trend of remote work, which inherently increases the risk of information security breaches due to insecure premises (A) and the need for additional tools like VPNs . There's also a higher likelihood of attackers exploiting vulnerabilities during such operational changes (D). However, the need for additional physical security at data centres and corporate headquarters (B) is less likely to be a direct result of a pandemic since the focus shifts to remote work and digital security rather than physical premises that are less occupied.
When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?
Answer : A
When selecting a third-party digital forensics service provider, it is crucial to ensure that the company has the appropriate accreditations and the staff hold relevant certifications. This ensures that the service provider adheres to recognized standards and best practices in digital forensics, which is essential for the integrity and admissibility of evidence. Company accreditation provides assurance that the organization follows industry-recognized quality standards, while staff certification demonstrates that the individuals handling the forensic process are qualified and competent. This combination is vital for maintaining the credibility of the forensic investigation and the security of the data handled.
Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?
Answer : B
The General Data Protection Regulation (GDPR) is a regulation that applies to all organizations operating within the EU and also to organizations outside of the EU that offer goods or services to, or monitor the behavior of, EU data subjects. It is designed to harmonize data privacy laws across Europe and to protect and empower all EU citizens' data privacy. The GDPR's relevance extends beyond geographical and sector-specific boundaries because it applies to any organization that processes the personal data of individuals within the EU, making it a global standard for data protection.
While other options like Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA) have significant impacts on specific sectors or regions, GDPR's broad scope makes it relevant to a wide range of organizations worldwide. It sets a precedent for data protection laws globally, influencing other regulations and becoming a de facto standard for many companies, even in countries without similar laws.
What form of attack against an employee has the MOST impact on their compliance with the organisation's "code of conduct"?
Answer : B
Social engineering attacks are designed to exploit human psychology and manipulate individuals into breaking normal security procedures and best practices. These attacks have the most impact on an employee's compliance with an organization's code of conduct because they directly target the employee's behavior and decision-making process. By using deception, persuasion, or influence, attackers can coerce employees into divulging confidential information, providing access to restricted areas, or performing actions that go against the company's policies and ethical standards. This form of attack can lead to violations of the code of conduct, as employees may unknowingly or unwillingly engage in activities that compromise the organization's values and principles.
Which three of the following characteristics form the AAA Triad in Information Security?
1. Authentication
2. Availability
3. Accounting
4. Asymmetry
5. Authorisation
Answer : D
The AAA Triad in Information Security stands for Authentication, Authorization (also known as Authorisation), and Accounting. These three components are fundamental to ensuring that access to systems is controlled and monitored:
Authenticationis the process of verifying the identity of a user or entity. It ensures that individuals are who they claim to be. This can involve methods such as passwords, biometrics, or tokens.
Authorizationdetermines what an authenticated user is allowed to do. It involves granting or denying rights to access resources and perform actions within a system based on the user's identity.
Accountingkeeps track of user activities. This includes logging when users log in and out, what actions they perform, and what resources they access. It's essential for auditing purposes and can also be used for billing or analyzing resource usage.
These principles are designed to protect information by managing potential risks and controlling access to data. They are part of a broader framework that includes physical, technical, and procedural controls to safeguard information assets.
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
Answer : B
The access control method described is Role-Based Access Control (RBAC). In RBAC, access permissions are based on the roles within an organization, and users are assigned to these roles based on their responsibilities and qualifications. Each role has a defined set of access permissions to perform certain operations. This method simplifies management and ensures that only authorized users can perform actions relevant to their role. For instance, 'Developers' can create and update files, 'Reviewers' can upload and update files, and 'Administrators' have the rights to upload, delete, and update files. This aligns with the RBAC model where permissions are grouped by role rather than by individual user, making it easier to manage and audit.
What are the different methods that can be used as access controls?
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
Answer : C
Access controls are essential in information security for ensuring that resources are available to authorized users and protected from unauthorized access. The methods of access control can be categorized as follows:
Detective: These controls are designed to identify and record unauthorized access attempts. They do not prevent access but are useful for auditing and monitoring purposes.
Physical: Physical controls are tangible measures taken to protect assets, such as locks, fences, and security guards.
Preventive: Preventive controls are designed to stop unauthorized access before it happens. This includes mechanisms like passwords, biometric scans, and encryption.
The combination of detective, physical, and preventive controls provides a robust framework for managing access to sensitive information and systems. Reactive controls are not typically classified as access controls since they deal with responding to incidents after they occur, and virtual controls are not a recognized category in this context.
The policies, processes, practices, and tools used to align the business value of information with the most appropriate and cost-effective infrastructure from the time information is conceived through its final disposition.
Which of the below business practices does this statement define?
Answer : A
The statement defines Information Lifecycle Management (ILM), which is a set of policies, processes, practices, and tools that manage the flow of an organization's information throughout its life cycle. ILM is concerned with aligning the business value of information with the most appropriate and cost-effective infrastructure from the moment the information is created until its final disposition. This includes how information is created, stored, used, archived, and eventually disposed of. An effective ILM strategy helps organizations manage their data in compliance with business requirements, regulatory obligations, and cost constraints.
Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?
Answer : A
ITIL (Information Technology Infrastructure Library) is a widely recognized framework that offers a comprehensive set of best practices for IT Service Management (ITSM). It assists organizations in aligning IT services with business goals, including security objectives. ITIL provides guidance on the entire service lifecycle, from service strategy and design to service transition, operation, and continual service improvement. By following ITIL's structured approach, organizations can enhance the quality of IT services, manage risk effectively, improve customer satisfaction, and ensure that IT and business strategies are in sync.
What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?
Answer : D
Quantitative risk assessment is the process of objectively measuring risk by assigning numerical values to the probability of an event occurring and its potential impact. This method is most likely to provide objective support for a security Return on Investment (ROI) case because it allows for the calculation of potential losses in monetary terms, which can be directly compared to the cost of implementing security measures. By quantifying risks and their financial implications, organizations can make informed decisions about where to allocate resources and how to prioritize security investments to maximize ROI. This approach is particularly useful when making a business case to stakeholders who require clear, financial justification for security expenditures.
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
Answer : C
The concept of a security culture within an organization emphasizes that security is not solely a technical issue but also a behavioral one. Appropriate behaviors are essential because they embody the organization's values and beliefs about security. These behaviors ensure that all members of the organization understand and adhere to security policies and procedures, thereby reducing risk and reinforcing the security regime. This includes following the 'need to know' principle, verifying IDs, and implementing access denial measures, but it is the appropriate behaviors that integrate these actions into a coherent and effective security culture.
A security analyst has been asked to provide a triple A service (AAA) for both wireless and remote access network services in an organization and must avoid using proprietary solutions.
What technology SHOULD they adapt?
Answer : B
The AAA service, which stands for Authentication, Authorization, and Accounting, is essential for managing user access to network resources. When it comes to providing AAA services for both wireless and remote access network services in a non-proprietary manner, RADIUS (Remote Authentication Dial-In User Service) is the most suitable technology.
TACACS+is a Cisco proprietary protocol and therefore does not meet the requirement of avoiding proprietary solutions.
OAuthis a framework for authorization and is not typically used for network access control in the same way that RADIUS is.
MS Access Databaseis not a network authentication protocol and would not provide the necessary AAA services for network security.
Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.
What does a penetration test do that a Vulnerability Scan does NOT?
Answer : A
A penetration test, unlike a vulnerability scan, is an in-depth process where security professionals actively attempt to exploit vulnerabilities in a system. The goal is to simulate a real-world attack to understand how an attacker could exploit vulnerabilities and to determine the potential impact. This involves not just identifying vulnerabilities, as a scan does, but also attempting to exploit them to understand the full extent of the risk. Penetration tests are typically manual or semi-automated and involve a variety of tools and techniques to uncover and exploit security weaknesses, which can include common tools like Nmap, Nessus, and Metasploit.
What term refers to the shared set of values within an organisation that determine how people are expected to behave in regard to information security?
Answer : B
ACode of Ethicstypically outlines the principles and moral values that guide the behavior of individuals within an organization but does not specifically address information security behaviors.
System Operating Proceduresare detailed written instructions to achieve uniformity of the performance of a specific function, which is more about the operational aspect rather than the underlying values or behaviors.
When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?
Answer : A
In the context of information security, risk is typically calculated as the product of likelihood and impact. This formula encapsulates the probability of a vulnerability being exploited (likelihood) and the potential damage or loss that could result from such an event (impact). The goal is to quantify the level of risk in order to prioritize mitigation efforts effectively. Options B, C, and D do not represent standard risk calculation formulas in information security management.
What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controls procedures during a critical emergency situation?
Which three of the following characteristics form the AAA Triad in Information Security?
1. Authentication
2. Availability
3. Accounting
4. Asymmetry
5. Authorisation
Answer : D
The AAA Triad in Information Security stands for Authentication, Authorization (also known as Authorisation), and Accounting. These three components are fundamental to ensuring that access to systems is controlled and monitored:
Authenticationis the process of verifying the identity of a user or entity. It ensures that individuals are who they claim to be. This can involve methods such as passwords, biometrics, or tokens.
Authorizationdetermines what an authenticated user is allowed to do. It involves granting or denying rights to access resources and perform actions within a system based on the user's identity.
Accountingkeeps track of user activities. This includes logging when users log in and out, what actions they perform, and what resources they access. It's essential for auditing purposes and can also be used for billing or analyzing resource usage.
These principles are designed to protect information by managing potential risks and controlling access to data. They are part of a broader framework that includes physical, technical, and procedural controls to safeguard information assets.
Why might the reporting of security incidents that involve personal data differ from other types of security incident?
Answer : C
When securing a wireless network, which of the following is NOT best practice?
Which of the following is NOT an information security specific vulnerability?
Answer : C
In the context of information security vulnerabilities, we are typically referring to weaknesses that can be exploited by threats to compromise the confidentiality, integrity, or availability of an information system. Options A, B, and D all represent potential vulnerabilities:
A: Use of HTTP for an Apache web server could allow for interception of data due to lack of encryption.
B: An unpatched Windows operating system could have known security flaws that can be exploited.
D: An unlocked filing cabinet could lead to unauthorized physical access to sensitive documents.
Option C, however, refers to the storage of confidential data in a fire safe, which is a protective measure rather than a vulnerability. A fire safe is designed to protect physical assets from damage or destruction, particularly in the event of a fire, and does not inherently contain a weakness that could be exploited by a cyber threat. Therefore, it is not considered an information security specific vulnerability.
What Is the PRIMARY difference between DevOps and DevSecOps?
Answer : C
The primary difference between DevOps and DevSecOps lies in the integration of security practices. DevOps is a methodology that emphasizes collaboration between development and operations teams to automate the software development process, including continuous integration (CI) and continuous delivery (CD). However, DevOps does not inherently prioritize security as part of the development process.
DevSecOps, on the other hand, extends the DevOps principles by integrating security into every aspect of the software development lifecycle. This approach is often summarized by the term ''shift-left,'' which means incorporating security from the beginning and throughout the development process, rather than treating it as an afterthought or a final step before deployment. In DevSecOps, security is considered a shared responsibility among all team members, and it is addressed through continuous security processes that are as integral as CI/CD in the DevOps culture.
How does the use of a "single sign-on" access control policy improve the security for an organisation implementing the policy?
Answer : C
Single sign-on (SSO) is an access control policy that allows users to authenticate with multiple applications and services by logging in only once. This approach improves security by reducing the number of credentials users must manage, which in turn decreases the likelihood of users writing down passwords. When users have to remember multiple complex passwords, they are more likely to write them down, use simple passwords, or repeat the same password across different services, all of which are security risks. SSO simplifies the login process, which can lead to stronger, unique passwords and reduce the risk of password-related breaches.
Why have MOST European countries developed specific legislation that permits police and security services to monitor communications traffic for specific purposes, such as the detection of crime?
What Is the PRIMARY security concern associated with the practice known as Bring Your Own Device (BYOD) that might affect a large organisation?
Answer : B
Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
Answer : C
The concept of a security culture within an organization emphasizes that security is not solely a technical issue but also a behavioral one. Appropriate behaviors are essential because they embody the organization's values and beliefs about security. These behaviors ensure that all members of the organization understand and adhere to security policies and procedures, thereby reducing risk and reinforcing the security regime. This includes following the 'need to know' principle, verifying IDs, and implementing access denial measures, but it is the appropriate behaviors that integrate these actions into a coherent and effective security culture.
Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?
1. Intellectual Property Rights.
2. Protection of Organisational Records
3. Forensic recovery of data.
4. Data Deduplication.
5. Data Protection & Privacy.
Answer : D
The ISO/IEC 27000 series, particularly ISO/IEC 27001, provides a framework for information security management systems (ISMS) that helps organizations secure their information assets. This series covers various aspects of information security, including the protection of organizational records and data protection & privacy, which are legal compliance requirements in many jurisdictions. Intellectual Property Rights (IPR) are also considered within the scope of information security as they pertain to the protection of proprietary information and assets. Forensic recovery of data and data deduplication are technical and operational considerations but are not directly addressed as compliance legal requirements within the ISO/IEC 27000 series.
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.
Answer : D
When outsourcing data processing, the original data owner has a legal duty of care to ensure that the third party is competent to process the data securely (1) and observes the same high standards as the data owner (2). This means that the third party must have the necessary skills, knowledge, and security measures in place to protect the data, and they must adhere to the same level of data protection and privacy standards as the original owner. Processing the data wherever it can be transferred (3) and archiving the data for the third party's own long-term usage (4) are not primary legal considerations and may, in fact, contravene data protection laws if done without proper safeguards and compliance with regulations.
How might the effectiveness of a security awareness program be effectively measured?
1) Employees are required to take an online multiple choice exam on security principles.
2) Employees are tested with social engineering techniques by an approved penetration tester.
3) Employees practice ethical hacking techniques on organisation systems.
4) No security vulnerabilities are reported during an audit.
5) Open source intelligence gathering is undertaken on staff social media profiles.
Answer : D
The effectiveness of a security awareness program can be measured through various methods that assess both the knowledge and behavior of employees regarding security practices.
Online multiple choice exam on security principles: This method evaluates the employees' understanding of the security principles they have been taught. It's a direct measure of their knowledge and retention.
Testing with social engineering techniques by an approved penetration tester: This practical approach tests employees' reactions to real-life security threats, such as phishing or pretexting, which can indicate the effectiveness of the training in changing behavior.
Open source intelligence gathering on staff social media profiles: This method can reveal whether employees are adhering to security policies by not disclosing sensitive information publicly.
Option 3 is not a direct measure of a security awareness program's effectiveness, as practicing ethical hacking techniques is more about skills development rather than assessing awareness. Option 4, while important, does not directly measure the effectiveness of the security awareness program but rather the overall security posture of the organization.
Which of the following is an asymmetric encryption algorithm?
Answer : D
RSA (Rivest-Shamir-Adleman) is a widely accepted asymmetric encryption algorithm. Unlike symmetric algorithms, which use the same key for both encryption and decryption, asymmetric algorithms use a pair of keys -- a public key for encryption and a private key for decryption. This method allows for secure key exchange over an insecure channel without the need to share the private key. RSA operates on the principle that it is easy to multiply large prime numbers together to create a product, but it is hard to reverse the process, i.e., to factorize the product back into the original primes. This one-way function underpins the security of RSA.
Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.
Which of the following is NOT an information security specific vulnerability?
Answer : C
In the context of information security vulnerabilities, we are typically referring to weaknesses that can be exploited by threats to compromise the confidentiality, integrity, or availability of an information system. Options A, B, and D all represent potential vulnerabilities:
A: Use of HTTP for an Apache web server could allow for interception of data due to lack of encryption.
B: An unpatched Windows operating system could have known security flaws that can be exploited.
D: An unlocked filing cabinet could lead to unauthorized physical access to sensitive documents.
Option C, however, refers to the storage of confidential data in a fire safe, which is a protective measure rather than a vulnerability. A fire safe is designed to protect physical assets from damage or destruction, particularly in the event of a fire, and does not inherently contain a weakness that could be exploited by a cyber threat. Therefore, it is not considered an information security specific vulnerability.
You are undertaking a qualitative risk assessment of a likely security threat to an information system.
What is the MAIN issue with this type of risk assessment?
Answer : A
The main issue with qualitative risk assessments is their inherent subjectivity. Unlike quantitative assessments that use numerical data, qualitative assessments rely on the judgment and experience of the assessors to estimate risks. This can lead to inconsistencies if the criteria for ranking and categorizing risks are not clearly defined and agreed upon by all stakeholders involved in the assessment process. The subjective nature of this method can also influence the prioritization of risks, potentially affecting the decision-making process regarding which security controls to implement.
What term refers to the shared set of values within an organisation that determine how people are expected to behave in regard to information security?
Answer : B
ACode of Ethicstypically outlines the principles and moral values that guide the behavior of individuals within an organization but does not specifically address information security behaviors.
System Operating Proceduresare detailed written instructions to achieve uniformity of the performance of a specific function, which is more about the operational aspect rather than the underlying values or behaviors.
Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?
Answer : A
ITIL (Information Technology Infrastructure Library) is a widely recognized framework that offers a comprehensive set of best practices for IT Service Management (ITSM). It assists organizations in aligning IT services with business goals, including security objectives. ITIL provides guidance on the entire service lifecycle, from service strategy and design to service transition, operation, and continual service improvement. By following ITIL's structured approach, organizations can enhance the quality of IT services, manage risk effectively, improve customer satisfaction, and ensure that IT and business strategies are in sync.
What aspect of an employee's contract of employment Is designed to prevent the unauthorised release of confidential data to third parties even after an employee has left their employment?
Answer : B
Non-disclosure agreements (NDAs) are legal contracts that are designed to protect sensitive information. They are a critical part of an employee's contract of employment to ensure that confidential data is not released to unauthorized third parties. NDAs are specifically intended to prevent the disclosure of confidential information both during the period of employment and after the employee has left the organization. This is essential for maintaining the integrity and confidentiality of proprietary information which could include trade secrets, client data, and other types of sensitive information.
Which of the following is NOT considered to be a form of computer misuse?
Answer : A
The term 'computer misuse' typically refers to activities that are illegal or unauthorized and involve a computer system. This includes illegal interception of information, illegal access to computer systems, and downloading of pirated software, as these actions are unauthorized and often involve breaching security measures. However, the illegal retention of personal data, while a serious privacy concern and potentially a legal issue, is not typically classified under the scope of 'computer misuse'. Instead, it falls under data protection and privacy regulations, which deal with the proper handling and storage of personal information.
Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on information security?
Answer : B
The global pandemic has accelerated the trend of remote work, which inherently increases the risk of information security breaches due to insecure premises (A) and the need for additional tools like VPNs . There's also a higher likelihood of attackers exploiting vulnerabilities during such operational changes (D). However, the need for additional physical security at data centres and corporate headquarters (B) is less likely to be a direct result of a pandemic since the focus shifts to remote work and digital security rather than physical premises that are less occupied.
What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controls procedures during a critical emergency situation?
Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?
Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?
Answer : A
ITIL (Information Technology Infrastructure Library) is a widely recognized framework that offers a comprehensive set of best practices for IT Service Management (ITSM). It assists organizations in aligning IT services with business goals, including security objectives. ITIL provides guidance on the entire service lifecycle, from service strategy and design to service transition, operation, and continual service improvement. By following ITIL's structured approach, organizations can enhance the quality of IT services, manage risk effectively, improve customer satisfaction, and ensure that IT and business strategies are in sync.
Which algorithm is a current specification for the encryption of electronic data established by NIST?
Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?
Answer : B
The deployment of end-to-end Internet of Things (IoT) solutions significantly increases the attack surface compared to traditional IT systems. This is due to the vast number of connected devices, each potentially introducing new vulnerabilities. The heterogeneity of these devices, often with varying levels of security, can lead to more entry points for cyberattacks. Additionally, the complexity of managing and securing these numerous devices, especially when they use different communication protocols and standards, exacerbates the risk. Therefore, the expansion of the attack surface is considered the greatest risk because it amplifies the potential for unauthorized access and compromises the integrity, availability, and confidentiality of information systems.
What form of attack against an employee has the MOST impact on their compliance with the organisation's "code of conduct"?
Answer : B
Social engineering attacks are designed to exploit human psychology and manipulate individuals into breaking normal security procedures and best practices. These attacks have the most impact on an employee's compliance with an organization's code of conduct because they directly target the employee's behavior and decision-making process. By using deception, persuasion, or influence, attackers can coerce employees into divulging confidential information, providing access to restricted areas, or performing actions that go against the company's policies and ethical standards. This form of attack can lead to violations of the code of conduct, as employees may unknowingly or unwillingly engage in activities that compromise the organization's values and principles.
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?
Answer : D
Developers should undergo Awareness Training to understand the security of the code they have written and how it can improve security defense while being attacked. This type of training educates developers on the importance of security considerations throughout the software development lifecycle (SDLC). It covers best practices for secure coding, common vulnerabilities and how to avoid them, and the impact of code security on the overall security posture of an application. By being aware of security principles and the potential threats, developers can write more secure code, which is crucial for defending against attacks.
Which of the following is an accepted strategic option for dealing with risk?
Answer : D
In the context of Information Security Management Principles, risk acceptance is a strategic option where an organization decides to accept the potential cost of a risk without taking any actions to mitigate it. This decision is typically made when the cost of mitigating the risk exceeds the cost of the risk's potential impact. Acceptance is part of the risk management process, which also includes risk identification, assessment, and treatment. When accepting a risk, it is crucial to document the decision and the rationale behind it, ensuring that it aligns with the organization's risk appetite and overall security policy.
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?
Answer : B
What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?
Answer : D
Quantitative risk assessment is the process of objectively measuring risk by assigning numerical values to the probability of an event occurring and its potential impact. This method is most likely to provide objective support for a security Return on Investment (ROI) case because it allows for the calculation of potential losses in monetary terms, which can be directly compared to the cost of implementing security measures. By quantifying risks and their financial implications, organizations can make informed decisions about where to allocate resources and how to prioritize security investments to maximize ROI. This approach is particularly useful when making a business case to stakeholders who require clear, financial justification for security expenditures.
Which of the following is often the final stage in the information management lifecycle?
Answer : A
The final stage in the information management lifecycle is often disposal. This stage involves the secure deletion or destruction of information that is no longer needed or has reached the end of its retention period. Proper disposal is crucial to prevent unauthorized access or recovery of sensitive data. It ensures compliance with data protection regulations and organizational policies regarding the retention and destruction of data.
Which three of the following characteristics form the AAA Triad in Information Security?
1. Authentication
2. Availability
3. Accounting
4. Asymmetry
5. Authorisation
Answer : D
The AAA Triad in Information Security stands for Authentication, Authorization (also known as Authorisation), and Accounting. These three components are fundamental to ensuring that access to systems is controlled and monitored:
Authenticationis the process of verifying the identity of a user or entity. It ensures that individuals are who they claim to be. This can involve methods such as passwords, biometrics, or tokens.
Authorizationdetermines what an authenticated user is allowed to do. It involves granting or denying rights to access resources and perform actions within a system based on the user's identity.
Accountingkeeps track of user activities. This includes logging when users log in and out, what actions they perform, and what resources they access. It's essential for auditing purposes and can also be used for billing or analyzing resource usage.
These principles are designed to protect information by managing potential risks and controlling access to data. They are part of a broader framework that includes physical, technical, and procedural controls to safeguard information assets.
Which types of organisations are likely to be the target of DDoS attacks?
Answer : D
Distributed Denial of Service (DDoS) attacks are a threat to any organization that maintains an online presence. This is because DDoS attacks are designed to overwhelm an organization's network with traffic, rendering it inaccessible to legitimate users. While cloud service providers, financial sector organizations, and online retail companies can be attractive targets due to their high-profile nature and the critical nature of their services, the reality is that any organization with an online presence can be targeted. This includes small businesses, educational institutions, government agencies, and non-profits. The motivation behind such attacks can vary from financial gain, to disruption of service, to political statements. Therefore, it's crucial for all organizations to implement robust security measures to mitigate the risk of DDoS attacks.
When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?
Answer : A
In the context of information security, risk is typically calculated as the product of likelihood and impact. This formula encapsulates the probability of a vulnerability being exploited (likelihood) and the potential damage or loss that could result from such an event (impact). The goal is to quantify the level of risk in order to prioritize mitigation efforts effectively. Options B, C, and D do not represent standard risk calculation formulas in information security management.
In order to better improve the security culture within an organisation with a top down approach, which of the following actions at board level is the MOST effective?
Answer : A
Appointing a Chief Information Security Officer (CISO) is the most effective action at the board level to improve the security culture within an organization using a top-down approach. The CISO plays a critical role in establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO is responsible for leading the development and implementation of a security program across all aspects of the organization, which includes aligning security initiatives with business objectives, managing risk, and ensuring compliance with relevant laws and regulations. This strategic role not only helps in creating a robust security posture but also promotes a culture of security awareness throughout the organization. By having a dedicated executive responsible for security, it sends a clear message that the organization prioritizes information security and is committed to protecting its assets and stakeholders.
Which standard deals with the implementation of business continuity?
Answer : C
The standard that deals specifically with the implementation of business continuity is ISO 22301, which is internationally recognized. It outlines the requirements for a business continuity management system (BCMS), which provides a framework for organizations to update, control, and deploy an effective BCMS that helps them to be prepared and respond effectively to disruptions. ISO/IEC 27001 is related to information security management systems (ISMS) and while it includes aspects of business continuity, it is not solely focused on it. COBIT is a framework for developing, implementing, monitoring, and improving IT governance and management practices, and BS5750 is a standard for quality management systems, now superseded by ISO 9000 series.
When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.
Answer : D
When outsourcing data processing, the original data owner has a legal duty of care to ensure that the third party is competent to process the data securely (1) and observes the same high standards as the data owner (2). This means that the third party must have the necessary skills, knowledge, and security measures in place to protect the data, and they must adhere to the same level of data protection and privacy standards as the original owner. Processing the data wherever it can be transferred (3) and archiving the data for the third party's own long-term usage (4) are not primary legal considerations and may, in fact, contravene data protection laws if done without proper safeguards and compliance with regulations.
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
Answer : C
The concept of a security culture within an organization emphasizes that security is not solely a technical issue but also a behavioral one. Appropriate behaviors are essential because they embody the organization's values and beliefs about security. These behaviors ensure that all members of the organization understand and adhere to security policies and procedures, thereby reducing risk and reinforcing the security regime. This includes following the 'need to know' principle, verifying IDs, and implementing access denial measures, but it is the appropriate behaviors that integrate these actions into a coherent and effective security culture.
Which of the following is NOT a valid statement to include in an organisation's security policy?
Answer : B
An organization's security policy should be a reflection of its own security stance and principles, not tailored to third parties. While it may be informed by third-party requirements, the policy itself should not be amended to suit all third-party contractors. This is because the security policy is meant to establish a clear set of rules and expectations for the organization's members to maintain the confidentiality, integrity, and availability of its data. It should be defined, approved by management, and communicated to employees and relevant external parties. Amending the policy to suit all third-party contractors could lead to a dilution of the security standards and potentially compromise the organization's security posture.
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
Answer : B
The access control method described is Role-Based Access Control (RBAC). In RBAC, access permissions are based on the roles within an organization, and users are assigned to these roles based on their responsibilities and qualifications. Each role has a defined set of access permissions to perform certain operations. This method simplifies management and ensures that only authorized users can perform actions relevant to their role. For instance, 'Developers' can create and update files, 'Reviewers' can upload and update files, and 'Administrators' have the rights to upload, delete, and update files. This aligns with the RBAC model where permissions are grouped by role rather than by individual user, making it easier to manage and audit.
Which membership based organisation produces international standards, which cover good practice for information assurance?
Answer : A
The British Standards Institution (BSI) is known for producing standards that cover good practices in various domains, including information assurance. BSI is the UK's national standards body and a founding member of the International Organization for Standardization (ISO). It contributes to the development of international standards through ISO, which provides frameworks and best practices for information security management systems (ISMS), such as the ISO/IEC 27000 series. These standards are designed to help organizations manage the security of assets such as financial information, intellectual property, employee details, and information entrusted by third parties.
Why have MOST European countries developed specific legislation that permits police and security services to monitor communications traffic for specific purposes, such as the detection of crime?
What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controls procedures during a critical emergency situation?
What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?
Answer : D
Quantitative risk assessment is the process of objectively measuring risk by assigning numerical values to the probability of an event occurring and its potential impact. This method is most likely to provide objective support for a security Return on Investment (ROI) case because it allows for the calculation of potential losses in monetary terms, which can be directly compared to the cost of implementing security measures. By quantifying risks and their financial implications, organizations can make informed decisions about where to allocate resources and how to prioritize security investments to maximize ROI. This approach is particularly useful when making a business case to stakeholders who require clear, financial justification for security expenditures.
Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.
Which algorithm is a current specification for the encryption of electronic data established by NIST?
Which types of organisations are likely to be the target of DDoS attacks?
Answer : D
Distributed Denial of Service (DDoS) attacks are a threat to any organization that maintains an online presence. This is because DDoS attacks are designed to overwhelm an organization's network with traffic, rendering it inaccessible to legitimate users. While cloud service providers, financial sector organizations, and online retail companies can be attractive targets due to their high-profile nature and the critical nature of their services, the reality is that any organization with an online presence can be targeted. This includes small businesses, educational institutions, government agencies, and non-profits. The motivation behind such attacks can vary from financial gain, to disruption of service, to political statements. Therefore, it's crucial for all organizations to implement robust security measures to mitigate the risk of DDoS attacks.
Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on information security?
Answer : B
The global pandemic has accelerated the trend of remote work, which inherently increases the risk of information security breaches due to insecure premises (A) and the need for additional tools like VPNs . There's also a higher likelihood of attackers exploiting vulnerabilities during such operational changes (D). However, the need for additional physical security at data centres and corporate headquarters (B) is less likely to be a direct result of a pandemic since the focus shifts to remote work and digital security rather than physical premises that are less occupied.
Which three of the following characteristics form the AAA Triad in Information Security?
1. Authentication
2. Availability
3. Accounting
4. Asymmetry
5. Authorisation
Answer : D
The AAA Triad in Information Security stands for Authentication, Authorization (also known as Authorisation), and Accounting. These three components are fundamental to ensuring that access to systems is controlled and monitored:
Authenticationis the process of verifying the identity of a user or entity. It ensures that individuals are who they claim to be. This can involve methods such as passwords, biometrics, or tokens.
Authorizationdetermines what an authenticated user is allowed to do. It involves granting or denying rights to access resources and perform actions within a system based on the user's identity.
Accountingkeeps track of user activities. This includes logging when users log in and out, what actions they perform, and what resources they access. It's essential for auditing purposes and can also be used for billing or analyzing resource usage.
These principles are designed to protect information by managing potential risks and controlling access to data. They are part of a broader framework that includes physical, technical, and procedural controls to safeguard information assets.
What form of attack against an employee has the MOST impact on their compliance with the organisation's "code of conduct"?
Answer : B
Social engineering attacks are designed to exploit human psychology and manipulate individuals into breaking normal security procedures and best practices. These attacks have the most impact on an employee's compliance with an organization's code of conduct because they directly target the employee's behavior and decision-making process. By using deception, persuasion, or influence, attackers can coerce employees into divulging confidential information, providing access to restricted areas, or performing actions that go against the company's policies and ethical standards. This form of attack can lead to violations of the code of conduct, as employees may unknowingly or unwillingly engage in activities that compromise the organization's values and principles.
Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?
When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?
Answer : A
When selecting a third-party digital forensics service provider, it is crucial to ensure that the company has the appropriate accreditations and the staff hold relevant certifications. This ensures that the service provider adheres to recognized standards and best practices in digital forensics, which is essential for the integrity and admissibility of evidence. Company accreditation provides assurance that the organization follows industry-recognized quality standards, while staff certification demonstrates that the individuals handling the forensic process are qualified and competent. This combination is vital for maintaining the credibility of the forensic investigation and the security of the data handled.
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?
Answer : D
Developers should undergo Awareness Training to understand the security of the code they have written and how it can improve security defense while being attacked. This type of training educates developers on the importance of security considerations throughout the software development lifecycle (SDLC). It covers best practices for secure coding, common vulnerabilities and how to avoid them, and the impact of code security on the overall security posture of an application. By being aware of security principles and the potential threats, developers can write more secure code, which is crucial for defending against attacks.
Which of the following is NOT considered to be a form of computer misuse?
Answer : A
The term 'computer misuse' typically refers to activities that are illegal or unauthorized and involve a computer system. This includes illegal interception of information, illegal access to computer systems, and downloading of pirated software, as these actions are unauthorized and often involve breaching security measures. However, the illegal retention of personal data, while a serious privacy concern and potentially a legal issue, is not typically classified under the scope of 'computer misuse'. Instead, it falls under data protection and privacy regulations, which deal with the proper handling and storage of personal information.
In order to better improve the security culture within an organisation with a top down approach, which of the following actions at board level is the MOST effective?
Answer : A
Appointing a Chief Information Security Officer (CISO) is the most effective action at the board level to improve the security culture within an organization using a top-down approach. The CISO plays a critical role in establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO is responsible for leading the development and implementation of a security program across all aspects of the organization, which includes aligning security initiatives with business objectives, managing risk, and ensuring compliance with relevant laws and regulations. This strategic role not only helps in creating a robust security posture but also promotes a culture of security awareness throughout the organization. By having a dedicated executive responsible for security, it sends a clear message that the organization prioritizes information security and is committed to protecting its assets and stakeholders.
Why might the reporting of security incidents that involve personal data differ from other types of security incident?
Answer : C
When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.
Answer : D
When outsourcing data processing, the original data owner has a legal duty of care to ensure that the third party is competent to process the data securely (1) and observes the same high standards as the data owner (2). This means that the third party must have the necessary skills, knowledge, and security measures in place to protect the data, and they must adhere to the same level of data protection and privacy standards as the original owner. Processing the data wherever it can be transferred (3) and archiving the data for the third party's own long-term usage (4) are not primary legal considerations and may, in fact, contravene data protection laws if done without proper safeguards and compliance with regulations.
When securing a wireless network, which of the following is NOT best practice?
Which of the following types of organisation could be considered the MOST at risk from the theft of electronic based credit card data?
Answer : A
Online retailers are the most at risk for the theft of electronic-based credit card data due to the nature of their business, which involves processing a large volume of transactions over the internet. This exposes them to various cyber threats, including hacking, phishing, and other forms of cyber-attacks that can compromise credit card information. Traditional market traders, mail delivery businesses, and agricultural producers typically do not handle credit card transactions to the same extent or in the same electronic manner as online retailers, making them less likely targets for this specific type of data theft.
Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?
Answer : C
Static verification refers to the set of processes that analyze code without executing it to ensure that defined coding practices are being followed. This method involves reviewing the code to detect errors, enforce coding standards, and identify security vulnerabilities. It is a crucial part of the software development lifecycle and helps maintain code quality and reliability. Static verification can be performed manually through code reviews or automatically using static analysis tools.
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
Answer : D
Defence in depth is a security concept that involves implementing multiple layers of security controls throughout an information system. The idea is that if one control fails or a vulnerability is exploited, other controls will provide redundancy and continue to protect the system. This approach is analogous to a physical fortress with multiple walls; if an attacker breaches one wall, additional barriers exist to stop them from progressing further. In the context of information security, this could include a combination of firewalls, intrusion detection systems, antivirus software, and strict access controls, among others. Defence in depth is designed to address security vulnerabilities not only in technology but also in processes and people, acknowledging that human error or negligence can often lead to security breaches.
Online retailers are the most at risk for the theft of electronic-based credit card data due to the nature of their business, which involves processing a large volume of transactions over the internet. This exposes them to various cyber threats, including hacking, phishing, and other forms of cyber-attacks that can compromise credit card information. Traditional market traders, mail delivery businesses, and agricultural producers typically do not handle credit card transactions to the same extent or in the same electronic manner as online retailers, making them less likely targets for this specific type of data theft.
James is working with a software programme that completely obfuscates the entire source code, often in the form of a binary executable making it difficult to inspect, manipulate or reverse engineer the original source code.
What type of software programme is this?
Answer : B
The software program described is one that obfuscates the source code, making it difficult to inspect, manipulate, or reverse engineer. This is characteristic of proprietary source software, where the source code is not openly shared or available for public viewing or modification. Proprietary software companies often obfuscate their code to protect intellectual property and prevent unauthorized use or reproduction of their software. Unlike open-source software, where the source code is available for anyone to view, modify, and distribute, proprietary software keeps its source code a secret to maintain control over the software's functions and distribution.
Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
Answer : B
The access control method described is Role-Based Access Control (RBAC). In RBAC, access permissions are based on the roles within an organization, and users are assigned to these roles based on their responsibilities and qualifications. Each role has a defined set of access permissions to perform certain operations. This method simplifies management and ensures that only authorized users can perform actions relevant to their role. For instance, 'Developers' can create and update files, 'Reviewers' can upload and update files, and 'Administrators' have the rights to upload, delete, and update files. This aligns with the RBAC model where permissions are grouped by role rather than by individual user, making it easier to manage and audit.
As well as being permitted to access, create, modify and delete information, what right does an Information Owner NORMALLY have in regard to their information?
What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controls procedures during a critical emergency situation?
What are the different methods that can be used as access controls?
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
Answer : C
Access controls are essential in information security for ensuring that resources are available to authorized users and protected from unauthorized access. The methods of access control can be categorized as follows:
Detective: These controls are designed to identify and record unauthorized access attempts. They do not prevent access but are useful for auditing and monitoring purposes.
Physical: Physical controls are tangible measures taken to protect assets, such as locks, fences, and security guards.
Preventive: Preventive controls are designed to stop unauthorized access before it happens. This includes mechanisms like passwords, biometric scans, and encryption.
The combination of detective, physical, and preventive controls provides a robust framework for managing access to sensitive information and systems. Reactive controls are not typically classified as access controls since they deal with responding to incidents after they occur, and virtual controls are not a recognized category in this context.
How does the use of a "single sign-on" access control policy improve the security for an organisation implementing the policy?
Answer : C
Single sign-on (SSO) is an access control policy that allows users to authenticate with multiple applications and services by logging in only once. This approach improves security by reducing the number of credentials users must manage, which in turn decreases the likelihood of users writing down passwords. When users have to remember multiple complex passwords, they are more likely to write them down, use simple passwords, or repeat the same password across different services, all of which are security risks. SSO simplifies the login process, which can lead to stronger, unique passwords and reduce the risk of password-related breaches.
When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles is considered BEST practice?
Answer : D
The best practice when handling and investigating digital evidence for use in a criminal cybercrime investigation is to ensure that digital devices are forensically ''clean'' before any investigation takes place. This means that the devices should be free from any potential contamination that could compromise the integrity of the evidence. It's crucial to maintain the original state of digital evidence as much as possible to ensure its admissibility in court. Altering digital evidence should be avoided unless it's absolutely necessary for the investigation, and even then, it should be done following strict protocols to document the changes made. While law enforcement often handles digital evidence, the principle of maintaining a forensically clean state applies universally to ensure the evidence remains untainted and reliable.
Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?
In order to better improve the security culture within an organisation with a top down approach, which of the following actions at board level is the MOST effective?
Answer : A
Appointing a Chief Information Security Officer (CISO) is the most effective action at the board level to improve the security culture within an organization using a top-down approach. The CISO plays a critical role in establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO is responsible for leading the development and implementation of a security program across all aspects of the organization, which includes aligning security initiatives with business objectives, managing risk, and ensuring compliance with relevant laws and regulations. This strategic role not only helps in creating a robust security posture but also promotes a culture of security awareness throughout the organization. By having a dedicated executive responsible for security, it sends a clear message that the organization prioritizes information security and is committed to protecting its assets and stakeholders.
Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?
Answer : B
The General Data Protection Regulation (GDPR) is a regulation that applies to all organizations operating within the EU and also to organizations outside of the EU that offer goods or services to, or monitor the behavior of, EU data subjects. It is designed to harmonize data privacy laws across Europe and to protect and empower all EU citizens' data privacy. The GDPR's relevance extends beyond geographical and sector-specific boundaries because it applies to any organization that processes the personal data of individuals within the EU, making it a global standard for data protection.
While other options like Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA) have significant impacts on specific sectors or regions, GDPR's broad scope makes it relevant to a wide range of organizations worldwide. It sets a precedent for data protection laws globally, influencing other regulations and becoming a de facto standard for many companies, even in countries without similar laws.
Why have MOST European countries developed specific legislation that permits police and security services to monitor communications traffic for specific purposes, such as the detection of crime?
Which of the following is MOST LIKELY to be described as a consequential loss?
Answer : A
Consequential loss in the context of information security refers to secondary or indirect damage that occurs as a result of a primary event or incident. It is not the immediate direct loss, such as theft of money or service disruption, but rather the subsequent impact that may not be immediately apparent. Reputation damage is a prime example of consequential loss because it is a secondary effect that can occur after a security breach or incident. The loss of trust by customers, partners, and stakeholders can have long-term negative effects on a business's financial health and market position. This type of loss is often more significant and lasting than the immediate direct costs associated with an incident.
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
Answer : C
The concept of a security culture within an organization emphasizes that security is not solely a technical issue but also a behavioral one. Appropriate behaviors are essential because they embody the organization's values and beliefs about security. These behaviors ensure that all members of the organization understand and adhere to security policies and procedures, thereby reducing risk and reinforcing the security regime. This includes following the 'need to know' principle, verifying IDs, and implementing access denial measures, but it is the appropriate behaviors that integrate these actions into a coherent and effective security culture.
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
Answer : D
Botnets are typically used by attackers for a variety of malicious activities, most commonly for:
Generating and distributing spam messages: Botnets can send out large volumes of spam emails to promote products or services, or to distribute malware.
Conducting DDoS attacks: Distributed Denial of Service (DDoS) attacks are often carried out using botnets to overwhelm a target's servers with traffic.
Scanning for system & application vulnerabilities: Botnets can be used to scan a large number of systems for vulnerabilities that can be exploited in further attacks.
According to ISO/IEC 27000, which of the following is the definition of a vulnerability?
Answer : A
The term 'vulnerability' within the context of ISO/IEC 27000 refers to any weakness present in an asset or group of assets that could potentially be exploited by one or more threats. This definition aligns with the concept of vulnerability as a gap in protection efforts that, if not addressed, could allow a threat to compromise the confidentiality, integrity, or availability of an asset. It is important to note that vulnerabilities can be identified in various components of an organization's infrastructure, including hardware, software, processes, and even personnel. Effective information security management involves identifying these vulnerabilities through risk assessments and implementing appropriate controls to mitigate the risk of exploitation.
What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controls procedures during a critical emergency situation?
Which of the following is an asymmetric encryption algorithm?
Answer : D
RSA (Rivest-Shamir-Adleman) is a widely accepted asymmetric encryption algorithm. Unlike symmetric algorithms, which use the same key for both encryption and decryption, asymmetric algorithms use a pair of keys -- a public key for encryption and a private key for decryption. This method allows for secure key exchange over an insecure channel without the need to share the private key. RSA operates on the principle that it is easy to multiply large prime numbers together to create a product, but it is hard to reverse the process, i.e., to factorize the product back into the original primes. This one-way function underpins the security of RSA.
What term refers to the shared set of values within an organisation that determine how people are expected to behave in regard to information security?
Answer : B
ACode of Ethicstypically outlines the principles and moral values that guide the behavior of individuals within an organization but does not specifically address information security behaviors.
System Operating Proceduresare detailed written instructions to achieve uniformity of the performance of a specific function, which is more about the operational aspect rather than the underlying values or behaviors.
Which of the following is NOT considered to be a form of computer misuse?
Answer : A
The term 'computer misuse' typically refers to activities that are illegal or unauthorized and involve a computer system. This includes illegal interception of information, illegal access to computer systems, and downloading of pirated software, as these actions are unauthorized and often involve breaching security measures. However, the illegal retention of personal data, while a serious privacy concern and potentially a legal issue, is not typically classified under the scope of 'computer misuse'. Instead, it falls under data protection and privacy regulations, which deal with the proper handling and storage of personal information.
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles is considered BEST practice?
Answer : D
The best practice when handling and investigating digital evidence for use in a criminal cybercrime investigation is to ensure that digital devices are forensically ''clean'' before any investigation takes place. This means that the devices should be free from any potential contamination that could compromise the integrity of the evidence. It's crucial to maintain the original state of digital evidence as much as possible to ensure its admissibility in court. Altering digital evidence should be avoided unless it's absolutely necessary for the investigation, and even then, it should be done following strict protocols to document the changes made. While law enforcement often handles digital evidence, the principle of maintaining a forensically clean state applies universally to ensure the evidence remains untainted and reliable.
What Is the PRIMARY difference between DevOps and DevSecOps?
Answer : C
The primary difference between DevOps and DevSecOps lies in the integration of security practices. DevOps is a methodology that emphasizes collaboration between development and operations teams to automate the software development process, including continuous integration (CI) and continuous delivery (CD). However, DevOps does not inherently prioritize security as part of the development process.
DevSecOps, on the other hand, extends the DevOps principles by integrating security into every aspect of the software development lifecycle. This approach is often summarized by the term ''shift-left,'' which means incorporating security from the beginning and throughout the development process, rather than treating it as an afterthought or a final step before deployment. In DevSecOps, security is considered a shared responsibility among all team members, and it is addressed through continuous security processes that are as integral as CI/CD in the DevOps culture.
Which standard deals with the implementation of business continuity?
Answer : C
The standard that deals specifically with the implementation of business continuity is ISO 22301, which is internationally recognized. It outlines the requirements for a business continuity management system (BCMS), which provides a framework for organizations to update, control, and deploy an effective BCMS that helps them to be prepared and respond effectively to disruptions. ISO/IEC 27001 is related to information security management systems (ISMS) and while it includes aspects of business continuity, it is not solely focused on it. COBIT is a framework for developing, implementing, monitoring, and improving IT governance and management practices, and BS5750 is a standard for quality management systems, now superseded by ISO 9000 series.
Which types of organisations are likely to be the target of DDoS attacks?
Answer : D
Distributed Denial of Service (DDoS) attacks are a threat to any organization that maintains an online presence. This is because DDoS attacks are designed to overwhelm an organization's network with traffic, rendering it inaccessible to legitimate users. While cloud service providers, financial sector organizations, and online retail companies can be attractive targets due to their high-profile nature and the critical nature of their services, the reality is that any organization with an online presence can be targeted. This includes small businesses, educational institutions, government agencies, and non-profits. The motivation behind such attacks can vary from financial gain, to disruption of service, to political statements. Therefore, it's crucial for all organizations to implement robust security measures to mitigate the risk of DDoS attacks.
Which algorithm is a current specification for the encryption of electronic data established by NIST?
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
Answer : B
The access control method described is Role-Based Access Control (RBAC). In RBAC, access permissions are based on the roles within an organization, and users are assigned to these roles based on their responsibilities and qualifications. Each role has a defined set of access permissions to perform certain operations. This method simplifies management and ensures that only authorized users can perform actions relevant to their role. For instance, 'Developers' can create and update files, 'Reviewers' can upload and update files, and 'Administrators' have the rights to upload, delete, and update files. This aligns with the RBAC model where permissions are grouped by role rather than by individual user, making it easier to manage and audit.
You are undertaking a qualitative risk assessment of a likely security threat to an information system.
What is the MAIN issue with this type of risk assessment?
Answer : A
The main issue with qualitative risk assessments is their inherent subjectivity. Unlike quantitative assessments that use numerical data, qualitative assessments rely on the judgment and experience of the assessors to estimate risks. This can lead to inconsistencies if the criteria for ranking and categorizing risks are not clearly defined and agreed upon by all stakeholders involved in the assessment process. The subjective nature of this method can also influence the prioritization of risks, potentially affecting the decision-making process regarding which security controls to implement.
Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?
1. Intellectual Property Rights.
2. Protection of Organisational Records
3. Forensic recovery of data.
4. Data Deduplication.
5. Data Protection & Privacy.
Answer : D
The ISO/IEC 27000 series, particularly ISO/IEC 27001, provides a framework for information security management systems (ISMS) that helps organizations secure their information assets. This series covers various aspects of information security, including the protection of organizational records and data protection & privacy, which are legal compliance requirements in many jurisdictions. Intellectual Property Rights (IPR) are also considered within the scope of information security as they pertain to the protection of proprietary information and assets. Forensic recovery of data and data deduplication are technical and operational considerations but are not directly addressed as compliance legal requirements within the ISO/IEC 27000 series.
Which cryptographic protocol preceded Transport Layer Security (TLS)?
Answer : C
When securing a wireless network, which of the following is NOT best practice?
Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?
Answer : A
ITIL (Information Technology Infrastructure Library) is a widely recognized framework that offers a comprehensive set of best practices for IT Service Management (ITSM). It assists organizations in aligning IT services with business goals, including security objectives. ITIL provides guidance on the entire service lifecycle, from service strategy and design to service transition, operation, and continual service improvement. By following ITIL's structured approach, organizations can enhance the quality of IT services, manage risk effectively, improve customer satisfaction, and ensure that IT and business strategies are in sync.
Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?
Answer : B
The deployment of end-to-end Internet of Things (IoT) solutions significantly increases the attack surface compared to traditional IT systems. This is due to the vast number of connected devices, each potentially introducing new vulnerabilities. The heterogeneity of these devices, often with varying levels of security, can lead to more entry points for cyberattacks. Additionally, the complexity of managing and securing these numerous devices, especially when they use different communication protocols and standards, exacerbates the risk. Therefore, the expansion of the attack surface is considered the greatest risk because it amplifies the potential for unauthorized access and compromises the integrity, availability, and confidentiality of information systems.
As well as being permitted to access, create, modify and delete information, what right does an Information Owner NORMALLY have in regard to their information?
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
Answer : D
Botnets are typically used by attackers for a variety of malicious activities, most commonly for:
Generating and distributing spam messages: Botnets can send out large volumes of spam emails to promote products or services, or to distribute malware.
Conducting DDoS attacks: Distributed Denial of Service (DDoS) attacks are often carried out using botnets to overwhelm a target's servers with traffic.
Scanning for system & application vulnerabilities: Botnets can be used to scan a large number of systems for vulnerabilities that can be exploited in further attacks.
Which of the following is an asymmetric encryption algorithm?
Answer : D
RSA (Rivest-Shamir-Adleman) is a widely accepted asymmetric encryption algorithm. Unlike symmetric algorithms, which use the same key for both encryption and decryption, asymmetric algorithms use a pair of keys -- a public key for encryption and a private key for decryption. This method allows for secure key exchange over an insecure channel without the need to share the private key. RSA operates on the principle that it is easy to multiply large prime numbers together to create a product, but it is hard to reverse the process, i.e., to factorize the product back into the original primes. This one-way function underpins the security of RSA.
Which of the following types of organisation could be considered the MOST at risk from the theft of electronic based credit card data?
Answer : A
Online retailers are the most at risk for the theft of electronic-based credit card data due to the nature of their business, which involves processing a large volume of transactions over the internet. This exposes them to various cyber threats, including hacking, phishing, and other forms of cyber-attacks that can compromise credit card information. Traditional market traders, mail delivery businesses, and agricultural producers typically do not handle credit card transactions to the same extent or in the same electronic manner as online retailers, making them less likely targets for this specific type of data theft.
When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?
Answer : A
When selecting a third-party digital forensics service provider, it is crucial to ensure that the company has the appropriate accreditations and the staff hold relevant certifications. This ensures that the service provider adheres to recognized standards and best practices in digital forensics, which is essential for the integrity and admissibility of evidence. Company accreditation provides assurance that the organization follows industry-recognized quality standards, while staff certification demonstrates that the individuals handling the forensic process are qualified and competent. This combination is vital for maintaining the credibility of the forensic investigation and the security of the data handled.
Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?
How might the effectiveness of a security awareness program be effectively measured?
1) Employees are required to take an online multiple choice exam on security principles.
2) Employees are tested with social engineering techniques by an approved penetration tester.
3) Employees practice ethical hacking techniques on organisation systems.
4) No security vulnerabilities are reported during an audit.
5) Open source intelligence gathering is undertaken on staff social media profiles.
Answer : D
The effectiveness of a security awareness program can be measured through various methods that assess both the knowledge and behavior of employees regarding security practices.
Online multiple choice exam on security principles: This method evaluates the employees' understanding of the security principles they have been taught. It's a direct measure of their knowledge and retention.
Testing with social engineering techniques by an approved penetration tester: This practical approach tests employees' reactions to real-life security threats, such as phishing or pretexting, which can indicate the effectiveness of the training in changing behavior.
Open source intelligence gathering on staff social media profiles: This method can reveal whether employees are adhering to security policies by not disclosing sensitive information publicly.
Option 3 is not a direct measure of a security awareness program's effectiveness, as practicing ethical hacking techniques is more about skills development rather than assessing awareness. Option 4, while important, does not directly measure the effectiveness of the security awareness program but rather the overall security posture of the organization.
Which of the following is NOT a valid statement to include in an organisation's security policy?
Answer : B
An organization's security policy should be a reflection of its own security stance and principles, not tailored to third parties. While it may be informed by third-party requirements, the policy itself should not be amended to suit all third-party contractors. This is because the security policy is meant to establish a clear set of rules and expectations for the organization's members to maintain the confidentiality, integrity, and availability of its data. It should be defined, approved by management, and communicated to employees and relevant external parties. Amending the policy to suit all third-party contractors could lead to a dilution of the security standards and potentially compromise the organization's security posture.
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?
Answer : D
Developers should undergo Awareness Training to understand the security of the code they have written and how it can improve security defense while being attacked. This type of training educates developers on the importance of security considerations throughout the software development lifecycle (SDLC). It covers best practices for secure coding, common vulnerabilities and how to avoid them, and the impact of code security on the overall security posture of an application. By being aware of security principles and the potential threats, developers can write more secure code, which is crucial for defending against attacks.
Which of the following is MOST LIKELY to be described as a consequential loss?
Answer : A
Consequential loss in the context of information security refers to secondary or indirect damage that occurs as a result of a primary event or incident. It is not the immediate direct loss, such as theft of money or service disruption, but rather the subsequent impact that may not be immediately apparent. Reputation damage is a prime example of consequential loss because it is a secondary effect that can occur after a security breach or incident. The loss of trust by customers, partners, and stakeholders can have long-term negative effects on a business's financial health and market position. This type of loss is often more significant and lasting than the immediate direct costs associated with an incident.
Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?
1. Intellectual Property Rights.
2. Protection of Organisational Records
3. Forensic recovery of data.
4. Data Deduplication.
5. Data Protection & Privacy.
Answer : D
The ISO/IEC 27000 series, particularly ISO/IEC 27001, provides a framework for information security management systems (ISMS) that helps organizations secure their information assets. This series covers various aspects of information security, including the protection of organizational records and data protection & privacy, which are legal compliance requirements in many jurisdictions. Intellectual Property Rights (IPR) are also considered within the scope of information security as they pertain to the protection of proprietary information and assets. Forensic recovery of data and data deduplication are technical and operational considerations but are not directly addressed as compliance legal requirements within the ISO/IEC 27000 series.
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
Answer : D
Botnets are typically used by attackers for a variety of malicious activities, most commonly for:
Generating and distributing spam messages: Botnets can send out large volumes of spam emails to promote products or services, or to distribute malware.
Conducting DDoS attacks: Distributed Denial of Service (DDoS) attacks are often carried out using botnets to overwhelm a target's servers with traffic.
Scanning for system & application vulnerabilities: Botnets can be used to scan a large number of systems for vulnerabilities that can be exploited in further attacks.
Which standard deals with the implementation of business continuity?
Answer : C
The standard that deals specifically with the implementation of business continuity is ISO 22301, which is internationally recognized. It outlines the requirements for a business continuity management system (BCMS), which provides a framework for organizations to update, control, and deploy an effective BCMS that helps them to be prepared and respond effectively to disruptions. ISO/IEC 27001 is related to information security management systems (ISMS) and while it includes aspects of business continuity, it is not solely focused on it. COBIT is a framework for developing, implementing, monitoring, and improving IT governance and management practices, and BS5750 is a standard for quality management systems, now superseded by ISO 9000 series.
How does the use of a "single sign-on" access control policy improve the security for an organisation implementing the policy?
Answer : C
Single sign-on (SSO) is an access control policy that allows users to authenticate with multiple applications and services by logging in only once. This approach improves security by reducing the number of credentials users must manage, which in turn decreases the likelihood of users writing down passwords. When users have to remember multiple complex passwords, they are more likely to write them down, use simple passwords, or repeat the same password across different services, all of which are security risks. SSO simplifies the login process, which can lead to stronger, unique passwords and reduce the risk of password-related breaches.
When securing a wireless network, which of the following is NOT best practice?
What term refers to the shared set of values within an organisation that determine how people are expected to behave in regard to information security?
Answer : B
ACode of Ethicstypically outlines the principles and moral values that guide the behavior of individuals within an organization but does not specifically address information security behaviors.
System Operating Proceduresare detailed written instructions to achieve uniformity of the performance of a specific function, which is more about the operational aspect rather than the underlying values or behaviors.
Which membership based organisation produces international standards, which cover good practice for information assurance?
Answer : A
The British Standards Institution (BSI) is known for producing standards that cover good practices in various domains, including information assurance. BSI is the UK's national standards body and a founding member of the International Organization for Standardization (ISO). It contributes to the development of international standards through ISO, which provides frameworks and best practices for information security management systems (ISMS), such as the ISO/IEC 27000 series. These standards are designed to help organizations manage the security of assets such as financial information, intellectual property, employee details, and information entrusted by third parties.
Which of the following is NOT an information security specific vulnerability?
Answer : C
In the context of information security vulnerabilities, we are typically referring to weaknesses that can be exploited by threats to compromise the confidentiality, integrity, or availability of an information system. Options A, B, and D all represent potential vulnerabilities:
A: Use of HTTP for an Apache web server could allow for interception of data due to lack of encryption.
B: An unpatched Windows operating system could have known security flaws that can be exploited.
D: An unlocked filing cabinet could lead to unauthorized physical access to sensitive documents.
Option C, however, refers to the storage of confidential data in a fire safe, which is a protective measure rather than a vulnerability. A fire safe is designed to protect physical assets from damage or destruction, particularly in the event of a fire, and does not inherently contain a weakness that could be exploited by a cyber threat. Therefore, it is not considered an information security specific vulnerability.
Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD) within the Information Security sphere?
Answer : B
The field of Information Security is dynamic and evolves rapidly, with new threats and technologies emerging regularly. Continual Professional Development (CPD) is crucial in this sphere to ensure that professionals stay up-to-date with the latest security trends, practices, and technologies. CPD enables information security professionals to maintain and enhance their knowledge and skills, which is vital for effectively protecting organizations against the ever-changing threat landscape. This ongoing learning process is not just about retaining credibility or meeting the requirements of professional bodies; it's about ensuring that professionals can respond to new challenges and remain effective in their roles.
What Is the KEY purpose of appending security classification labels to information?
Answer : A
The primary purpose of appending security classification labels to information is to guide the implementation of appropriate security controls. These labels indicate the level of sensitivity of the information and determine the extent and nature of the controls that need to be applied to protect it. For example, information classified as 'Confidential' will require stricter access controls compared to information classified as 'Public'. The classification labels help in ensuring that information is handled and protected in accordance with its importance to the organization, and in compliance with relevant legal and regulatory requirements.
What are the different methods that can be used as access controls?
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
Answer : C
Access controls are essential in information security for ensuring that resources are available to authorized users and protected from unauthorized access. The methods of access control can be categorized as follows:
Detective: These controls are designed to identify and record unauthorized access attempts. They do not prevent access but are useful for auditing and monitoring purposes.
Physical: Physical controls are tangible measures taken to protect assets, such as locks, fences, and security guards.
Preventive: Preventive controls are designed to stop unauthorized access before it happens. This includes mechanisms like passwords, biometric scans, and encryption.
The combination of detective, physical, and preventive controls provides a robust framework for managing access to sensitive information and systems. Reactive controls are not typically classified as access controls since they deal with responding to incidents after they occur, and virtual controls are not a recognized category in this context.
What aspect of an employee's contract of employment Is designed to prevent the unauthorised release of confidential data to third parties even after an employee has left their employment?
Answer : B
Non-disclosure agreements (NDAs) are legal contracts that are designed to protect sensitive information. They are a critical part of an employee's contract of employment to ensure that confidential data is not released to unauthorized third parties. NDAs are specifically intended to prevent the disclosure of confidential information both during the period of employment and after the employee has left the organization. This is essential for maintaining the integrity and confidentiality of proprietary information which could include trade secrets, client data, and other types of sensitive information.
Which term describes the acknowledgement and acceptance of ownership of actions, decisions, policies and deliverables?
Answer : A
Accountability is the term that describes the acknowledgement and acceptance of ownership of actions, decisions, policies, and deliverables. It implies that an individual or organization is willing to take responsibility for their actions and the outcomes of those actions, and is answerable to the relevant stakeholders. This concept is fundamental in information security management, as it ensures that individuals and teams are aware of their roles and the expectations placed upon them, particularly in relation to the protection of information assets. Accountability cannot be delegated; while tasks can be assigned to others, the ultimate ownership and obligation to report and justify the outcomes remain with the accountable party.
When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.
Answer : D
When outsourcing data processing, the original data owner has a legal duty of care to ensure that the third party is competent to process the data securely (1) and observes the same high standards as the data owner (2). This means that the third party must have the necessary skills, knowledge, and security measures in place to protect the data, and they must adhere to the same level of data protection and privacy standards as the original owner. Processing the data wherever it can be transferred (3) and archiving the data for the third party's own long-term usage (4) are not primary legal considerations and may, in fact, contravene data protection laws if done without proper safeguards and compliance with regulations.
Which algorithm is a current specification for the encryption of electronic data established by NIST?
What form of attack against an employee has the MOST impact on their compliance with the organisation's "code of conduct"?
Answer : B
Social engineering attacks are designed to exploit human psychology and manipulate individuals into breaking normal security procedures and best practices. These attacks have the most impact on an employee's compliance with an organization's code of conduct because they directly target the employee's behavior and decision-making process. By using deception, persuasion, or influence, attackers can coerce employees into divulging confidential information, providing access to restricted areas, or performing actions that go against the company's policies and ethical standards. This form of attack can lead to violations of the code of conduct, as employees may unknowingly or unwillingly engage in activities that compromise the organization's values and principles.
When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?
Answer : A
In the context of information security, risk is typically calculated as the product of likelihood and impact. This formula encapsulates the probability of a vulnerability being exploited (likelihood) and the potential damage or loss that could result from such an event (impact). The goal is to quantify the level of risk in order to prioritize mitigation efforts effectively. Options B, C, and D do not represent standard risk calculation formulas in information security management.
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?
Answer : B
When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?
Answer : A
When selecting a third-party digital forensics service provider, it is crucial to ensure that the company has the appropriate accreditations and the staff hold relevant certifications. This ensures that the service provider adheres to recognized standards and best practices in digital forensics, which is essential for the integrity and admissibility of evidence. Company accreditation provides assurance that the organization follows industry-recognized quality standards, while staff certification demonstrates that the individuals handling the forensic process are qualified and competent. This combination is vital for maintaining the credibility of the forensic investigation and the security of the data handled.
Which of the following is often the final stage in the information management lifecycle?
Answer : A
The final stage in the information management lifecycle is often disposal. This stage involves the secure deletion or destruction of information that is no longer needed or has reached the end of its retention period. Proper disposal is crucial to prevent unauthorized access or recovery of sensitive data. It ensures compliance with data protection regulations and organizational policies regarding the retention and destruction of data.
Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?
As well as being permitted to access, create, modify and delete information, what right does an Information Owner NORMALLY have in regard to their information?
What Is the PRIMARY difference between DevOps and DevSecOps?
Answer : C
The primary difference between DevOps and DevSecOps lies in the integration of security practices. DevOps is a methodology that emphasizes collaboration between development and operations teams to automate the software development process, including continuous integration (CI) and continuous delivery (CD). However, DevOps does not inherently prioritize security as part of the development process.
DevSecOps, on the other hand, extends the DevOps principles by integrating security into every aspect of the software development lifecycle. This approach is often summarized by the term ''shift-left,'' which means incorporating security from the beginning and throughout the development process, rather than treating it as an afterthought or a final step before deployment. In DevSecOps, security is considered a shared responsibility among all team members, and it is addressed through continuous security processes that are as integral as CI/CD in the DevOps culture.
Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?
Answer : A
ITIL (Information Technology Infrastructure Library) is a widely recognized framework that offers a comprehensive set of best practices for IT Service Management (ITSM). It assists organizations in aligning IT services with business goals, including security objectives. ITIL provides guidance on the entire service lifecycle, from service strategy and design to service transition, operation, and continual service improvement. By following ITIL's structured approach, organizations can enhance the quality of IT services, manage risk effectively, improve customer satisfaction, and ensure that IT and business strategies are in sync.
Which of the following is an asymmetric encryption algorithm?
Answer : D
RSA (Rivest-Shamir-Adleman) is a widely accepted asymmetric encryption algorithm. Unlike symmetric algorithms, which use the same key for both encryption and decryption, asymmetric algorithms use a pair of keys -- a public key for encryption and a private key for decryption. This method allows for secure key exchange over an insecure channel without the need to share the private key. RSA operates on the principle that it is easy to multiply large prime numbers together to create a product, but it is hard to reverse the process, i.e., to factorize the product back into the original primes. This one-way function underpins the security of RSA.
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?
Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD) within the Information Security sphere?
Answer : B
The field of Information Security is dynamic and evolves rapidly, with new threats and technologies emerging regularly. Continual Professional Development (CPD) is crucial in this sphere to ensure that professionals stay up-to-date with the latest security trends, practices, and technologies. CPD enables information security professionals to maintain and enhance their knowledge and skills, which is vital for effectively protecting organizations against the ever-changing threat landscape. This ongoing learning process is not just about retaining credibility or meeting the requirements of professional bodies; it's about ensuring that professionals can respond to new challenges and remain effective in their roles.
Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?
Answer : B
The deployment of end-to-end Internet of Things (IoT) solutions significantly increases the attack surface compared to traditional IT systems. This is due to the vast number of connected devices, each potentially introducing new vulnerabilities. The heterogeneity of these devices, often with varying levels of security, can lead to more entry points for cyberattacks. Additionally, the complexity of managing and securing these numerous devices, especially when they use different communication protocols and standards, exacerbates the risk. Therefore, the expansion of the attack surface is considered the greatest risk because it amplifies the potential for unauthorized access and compromises the integrity, availability, and confidentiality of information systems.
Which types of organisations are likely to be the target of DDoS attacks?
Answer : D
Distributed Denial of Service (DDoS) attacks are a threat to any organization that maintains an online presence. This is because DDoS attacks are designed to overwhelm an organization's network with traffic, rendering it inaccessible to legitimate users. While cloud service providers, financial sector organizations, and online retail companies can be attractive targets due to their high-profile nature and the critical nature of their services, the reality is that any organization with an online presence can be targeted. This includes small businesses, educational institutions, government agencies, and non-profits. The motivation behind such attacks can vary from financial gain, to disruption of service, to political statements. Therefore, it's crucial for all organizations to implement robust security measures to mitigate the risk of DDoS attacks.
Why is it prudent for Third Parties to be contracted to meet specific security standards?
Answer : A
Contracting third parties to meet specific security standards is prudent because vulnerabilities within their networks can be exploited to gain unauthorized access to a client's environment. Third-party vendors often have access to an organization's sensitive data and systems, which can become a potential entry point for cyber attackers. By ensuring that third parties adhere to stringent security standards, an organization can better protect itself against the risk of data breaches and cyber attacks that may originate from less secure third-party networks. This proactive approach to third-party security helps maintain the integrity and confidentiality of the organization's data and systems.
You are undertaking a qualitative risk assessment of a likely security threat to an information system.
What is the MAIN issue with this type of risk assessment?
Answer : A
The main issue with qualitative risk assessments is their inherent subjectivity. Unlike quantitative assessments that use numerical data, qualitative assessments rely on the judgment and experience of the assessors to estimate risks. This can lead to inconsistencies if the criteria for ranking and categorizing risks are not clearly defined and agreed upon by all stakeholders involved in the assessment process. The subjective nature of this method can also influence the prioritization of risks, potentially affecting the decision-making process regarding which security controls to implement.
Which standard deals with the implementation of business continuity?
Answer : C
The standard that deals specifically with the implementation of business continuity is ISO 22301, which is internationally recognized. It outlines the requirements for a business continuity management system (BCMS), which provides a framework for organizations to update, control, and deploy an effective BCMS that helps them to be prepared and respond effectively to disruptions. ISO/IEC 27001 is related to information security management systems (ISMS) and while it includes aspects of business continuity, it is not solely focused on it. COBIT is a framework for developing, implementing, monitoring, and improving IT governance and management practices, and BS5750 is a standard for quality management systems, now superseded by ISO 9000 series.
Which of the following describes a qualitative risk assessment approach?
Answer : A
A qualitative risk assessment approach is characterized by the subjective analysis of the likelihood of a risk occurring and its potential impact. This method relies on the judgment and experience of the assessor to estimate the severity of a risk. It does not use numerical data or statistical methods, which are typical of quantitative assessments. Instead, it may use descriptors like 'low', 'medium', or 'high' to rate both the likelihood of occurrence and the potential impact. This approach is useful when precise data is unavailable or when assessing complex, multifaceted risks where human insight is valuable.
According to ISO/IEC 27000, which of the following is the definition of a vulnerability?
Answer : A
The term 'vulnerability' within the context of ISO/IEC 27000 refers to any weakness present in an asset or group of assets that could potentially be exploited by one or more threats. This definition aligns with the concept of vulnerability as a gap in protection efforts that, if not addressed, could allow a threat to compromise the confidentiality, integrity, or availability of an asset. It is important to note that vulnerabilities can be identified in various components of an organization's infrastructure, including hardware, software, processes, and even personnel. Effective information security management involves identifying these vulnerabilities through risk assessments and implementing appropriate controls to mitigate the risk of exploitation.
As well as being permitted to access, create, modify and delete information, what right does an Information Owner NORMALLY have in regard to their information?
What does a penetration test do that a Vulnerability Scan does NOT?
Answer : A
A penetration test, unlike a vulnerability scan, is an in-depth process where security professionals actively attempt to exploit vulnerabilities in a system. The goal is to simulate a real-world attack to understand how an attacker could exploit vulnerabilities and to determine the potential impact. This involves not just identifying vulnerabilities, as a scan does, but also attempting to exploit them to understand the full extent of the risk. Penetration tests are typically manual or semi-automated and involve a variety of tools and techniques to uncover and exploit security weaknesses, which can include common tools like Nmap, Nessus, and Metasploit.
When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.
Answer : D
When outsourcing data processing, the original data owner has a legal duty of care to ensure that the third party is competent to process the data securely (1) and observes the same high standards as the data owner (2). This means that the third party must have the necessary skills, knowledge, and security measures in place to protect the data, and they must adhere to the same level of data protection and privacy standards as the original owner. Processing the data wherever it can be transferred (3) and archiving the data for the third party's own long-term usage (4) are not primary legal considerations and may, in fact, contravene data protection laws if done without proper safeguards and compliance with regulations.
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
Answer : B
The access control method described is Role-Based Access Control (RBAC). In RBAC, access permissions are based on the roles within an organization, and users are assigned to these roles based on their responsibilities and qualifications. Each role has a defined set of access permissions to perform certain operations. This method simplifies management and ensures that only authorized users can perform actions relevant to their role. For instance, 'Developers' can create and update files, 'Reviewers' can upload and update files, and 'Administrators' have the rights to upload, delete, and update files. This aligns with the RBAC model where permissions are grouped by role rather than by individual user, making it easier to manage and audit.
You are undertaking a qualitative risk assessment of a likely security threat to an information system.
What is the MAIN issue with this type of risk assessment?
Answer : A
The main issue with qualitative risk assessments is their inherent subjectivity. Unlike quantitative assessments that use numerical data, qualitative assessments rely on the judgment and experience of the assessors to estimate risks. This can lead to inconsistencies if the criteria for ranking and categorizing risks are not clearly defined and agreed upon by all stakeholders involved in the assessment process. The subjective nature of this method can also influence the prioritization of risks, potentially affecting the decision-making process regarding which security controls to implement.
In order to better improve the security culture within an organisation with a top down approach, which of the following actions at board level is the MOST effective?
Answer : A
Appointing a Chief Information Security Officer (CISO) is the most effective action at the board level to improve the security culture within an organization using a top-down approach. The CISO plays a critical role in establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO is responsible for leading the development and implementation of a security program across all aspects of the organization, which includes aligning security initiatives with business objectives, managing risk, and ensuring compliance with relevant laws and regulations. This strategic role not only helps in creating a robust security posture but also promotes a culture of security awareness throughout the organization. By having a dedicated executive responsible for security, it sends a clear message that the organization prioritizes information security and is committed to protecting its assets and stakeholders.
What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?
Answer : D
Quantitative risk assessment is the process of objectively measuring risk by assigning numerical values to the probability of an event occurring and its potential impact. This method is most likely to provide objective support for a security Return on Investment (ROI) case because it allows for the calculation of potential losses in monetary terms, which can be directly compared to the cost of implementing security measures. By quantifying risks and their financial implications, organizations can make informed decisions about where to allocate resources and how to prioritize security investments to maximize ROI. This approach is particularly useful when making a business case to stakeholders who require clear, financial justification for security expenditures.
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
Answer : C
The concept of a security culture within an organization emphasizes that security is not solely a technical issue but also a behavioral one. Appropriate behaviors are essential because they embody the organization's values and beliefs about security. These behaviors ensure that all members of the organization understand and adhere to security policies and procedures, thereby reducing risk and reinforcing the security regime. This includes following the 'need to know' principle, verifying IDs, and implementing access denial measures, but it is the appropriate behaviors that integrate these actions into a coherent and effective security culture.
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?
Answer : B
Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on information security?
Answer : B
The global pandemic has accelerated the trend of remote work, which inherently increases the risk of information security breaches due to insecure premises (A) and the need for additional tools like VPNs . There's also a higher likelihood of attackers exploiting vulnerabilities during such operational changes (D). However, the need for additional physical security at data centres and corporate headquarters (B) is less likely to be a direct result of a pandemic since the focus shifts to remote work and digital security rather than physical premises that are less occupied.
How might the effectiveness of a security awareness program be effectively measured?
1) Employees are required to take an online multiple choice exam on security principles.
2) Employees are tested with social engineering techniques by an approved penetration tester.
3) Employees practice ethical hacking techniques on organisation systems.
4) No security vulnerabilities are reported during an audit.
5) Open source intelligence gathering is undertaken on staff social media profiles.
Answer : D
The effectiveness of a security awareness program can be measured through various methods that assess both the knowledge and behavior of employees regarding security practices.
Online multiple choice exam on security principles: This method evaluates the employees' understanding of the security principles they have been taught. It's a direct measure of their knowledge and retention.
Testing with social engineering techniques by an approved penetration tester: This practical approach tests employees' reactions to real-life security threats, such as phishing or pretexting, which can indicate the effectiveness of the training in changing behavior.
Open source intelligence gathering on staff social media profiles: This method can reveal whether employees are adhering to security policies by not disclosing sensitive information publicly.
Option 3 is not a direct measure of a security awareness program's effectiveness, as practicing ethical hacking techniques is more about skills development rather than assessing awareness. Option 4, while important, does not directly measure the effectiveness of the security awareness program but rather the overall security posture of the organization.
Which of the following describes a qualitative risk assessment approach?
Answer : A
A qualitative risk assessment approach is characterized by the subjective analysis of the likelihood of a risk occurring and its potential impact. This method relies on the judgment and experience of the assessor to estimate the severity of a risk. It does not use numerical data or statistical methods, which are typical of quantitative assessments. Instead, it may use descriptors like 'low', 'medium', or 'high' to rate both the likelihood of occurrence and the potential impact. This approach is useful when precise data is unavailable or when assessing complex, multifaceted risks where human insight is valuable.
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
What term refers to the shared set of values within an organisation that determine how people are expected to behave in regard to information security?
Answer : B
ACode of Ethicstypically outlines the principles and moral values that guide the behavior of individuals within an organization but does not specifically address information security behaviors.
System Operating Proceduresare detailed written instructions to achieve uniformity of the performance of a specific function, which is more about the operational aspect rather than the underlying values or behaviors.
Which three of the following characteristics form the AAA Triad in Information Security?
1. Authentication
2. Availability
3. Accounting
4. Asymmetry
5. Authorisation
Answer : D
The AAA Triad in Information Security stands for Authentication, Authorization (also known as Authorisation), and Accounting. These three components are fundamental to ensuring that access to systems is controlled and monitored:
Authenticationis the process of verifying the identity of a user or entity. It ensures that individuals are who they claim to be. This can involve methods such as passwords, biometrics, or tokens.
Authorizationdetermines what an authenticated user is allowed to do. It involves granting or denying rights to access resources and perform actions within a system based on the user's identity.
Accountingkeeps track of user activities. This includes logging when users log in and out, what actions they perform, and what resources they access. It's essential for auditing purposes and can also be used for billing or analyzing resource usage.
These principles are designed to protect information by managing potential risks and controlling access to data. They are part of a broader framework that includes physical, technical, and procedural controls to safeguard information assets.
Which of the following is an accepted strategic option for dealing with risk?
Answer : D
In the context of Information Security Management Principles, risk acceptance is a strategic option where an organization decides to accept the potential cost of a risk without taking any actions to mitigate it. This decision is typically made when the cost of mitigating the risk exceeds the cost of the risk's potential impact. Acceptance is part of the risk management process, which also includes risk identification, assessment, and treatment. When accepting a risk, it is crucial to document the decision and the rationale behind it, ensuring that it aligns with the organization's risk appetite and overall security policy.
Which of the following is NOT a valid statement to include in an organisation's security policy?
Answer : B
An organization's security policy should be a reflection of its own security stance and principles, not tailored to third parties. While it may be informed by third-party requirements, the policy itself should not be amended to suit all third-party contractors. This is because the security policy is meant to establish a clear set of rules and expectations for the organization's members to maintain the confidentiality, integrity, and availability of its data. It should be defined, approved by management, and communicated to employees and relevant external parties. Amending the policy to suit all third-party contractors could lead to a dilution of the security standards and potentially compromise the organization's security posture.
Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.
Which of the following is NOT an information security specific vulnerability?
Answer : C
In the context of information security vulnerabilities, we are typically referring to weaknesses that can be exploited by threats to compromise the confidentiality, integrity, or availability of an information system. Options A, B, and D all represent potential vulnerabilities:
A: Use of HTTP for an Apache web server could allow for interception of data due to lack of encryption.
B: An unpatched Windows operating system could have known security flaws that can be exploited.
D: An unlocked filing cabinet could lead to unauthorized physical access to sensitive documents.
Option C, however, refers to the storage of confidential data in a fire safe, which is a protective measure rather than a vulnerability. A fire safe is designed to protect physical assets from damage or destruction, particularly in the event of a fire, and does not inherently contain a weakness that could be exploited by a cyber threat. Therefore, it is not considered an information security specific vulnerability.
According to ISO/IEC 27000, which of the following is the definition of a vulnerability?
Answer : A
The term 'vulnerability' within the context of ISO/IEC 27000 refers to any weakness present in an asset or group of assets that could potentially be exploited by one or more threats. This definition aligns with the concept of vulnerability as a gap in protection efforts that, if not addressed, could allow a threat to compromise the confidentiality, integrity, or availability of an asset. It is important to note that vulnerabilities can be identified in various components of an organization's infrastructure, including hardware, software, processes, and even personnel. Effective information security management involves identifying these vulnerabilities through risk assessments and implementing appropriate controls to mitigate the risk of exploitation.
When securing a wireless network, which of the following is NOT best practice?
The policies, processes, practices, and tools used to align the business value of information with the most appropriate and cost-effective infrastructure from the time information is conceived through its final disposition.
Which of the below business practices does this statement define?
Answer : A
The statement defines Information Lifecycle Management (ILM), which is a set of policies, processes, practices, and tools that manage the flow of an organization's information throughout its life cycle. ILM is concerned with aligning the business value of information with the most appropriate and cost-effective infrastructure from the moment the information is created until its final disposition. This includes how information is created, stored, used, archived, and eventually disposed of. An effective ILM strategy helps organizations manage their data in compliance with business requirements, regulatory obligations, and cost constraints.
What aspect of an employee's contract of employment Is designed to prevent the unauthorised release of confidential data to third parties even after an employee has left their employment?
Answer : B
Non-disclosure agreements (NDAs) are legal contracts that are designed to protect sensitive information. They are a critical part of an employee's contract of employment to ensure that confidential data is not released to unauthorized third parties. NDAs are specifically intended to prevent the disclosure of confidential information both during the period of employment and after the employee has left the organization. This is essential for maintaining the integrity and confidentiality of proprietary information which could include trade secrets, client data, and other types of sensitive information.
What Is the KEY purpose of appending security classification labels to information?
Answer : A
The primary purpose of appending security classification labels to information is to guide the implementation of appropriate security controls. These labels indicate the level of sensitivity of the information and determine the extent and nature of the controls that need to be applied to protect it. For example, information classified as 'Confidential' will require stricter access controls compared to information classified as 'Public'. The classification labels help in ensuring that information is handled and protected in accordance with its importance to the organization, and in compliance with relevant legal and regulatory requirements.
Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?
Answer : C
Static verification refers to the set of processes that analyze code without executing it to ensure that defined coding practices are being followed. This method involves reviewing the code to detect errors, enforce coding standards, and identify security vulnerabilities. It is a crucial part of the software development lifecycle and helps maintain code quality and reliability. Static verification can be performed manually through code reviews or automatically using static analysis tools.
When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?
Answer : A
In the context of information security, risk is typically calculated as the product of likelihood and impact. This formula encapsulates the probability of a vulnerability being exploited (likelihood) and the potential damage or loss that could result from such an event (impact). The goal is to quantify the level of risk in order to prioritize mitigation efforts effectively. Options B, C, and D do not represent standard risk calculation formulas in information security management.
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
Answer : C
The concept of a security culture within an organization emphasizes that security is not solely a technical issue but also a behavioral one. Appropriate behaviors are essential because they embody the organization's values and beliefs about security. These behaviors ensure that all members of the organization understand and adhere to security policies and procedures, thereby reducing risk and reinforcing the security regime. This includes following the 'need to know' principle, verifying IDs, and implementing access denial measures, but it is the appropriate behaviors that integrate these actions into a coherent and effective security culture.
Which three of the following characteristics form the AAA Triad in Information Security?
1. Authentication
2. Availability
3. Accounting
4. Asymmetry
5. Authorisation
Answer : D
The AAA Triad in Information Security stands for Authentication, Authorization (also known as Authorisation), and Accounting. These three components are fundamental to ensuring that access to systems is controlled and monitored:
Authenticationis the process of verifying the identity of a user or entity. It ensures that individuals are who they claim to be. This can involve methods such as passwords, biometrics, or tokens.
Authorizationdetermines what an authenticated user is allowed to do. It involves granting or denying rights to access resources and perform actions within a system based on the user's identity.
Accountingkeeps track of user activities. This includes logging when users log in and out, what actions they perform, and what resources they access. It's essential for auditing purposes and can also be used for billing or analyzing resource usage.
These principles are designed to protect information by managing potential risks and controlling access to data. They are part of a broader framework that includes physical, technical, and procedural controls to safeguard information assets.
Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?
In order to better improve the security culture within an organisation with a top down approach, which of the following actions at board level is the MOST effective?
Answer : A
Appointing a Chief Information Security Officer (CISO) is the most effective action at the board level to improve the security culture within an organization using a top-down approach. The CISO plays a critical role in establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO is responsible for leading the development and implementation of a security program across all aspects of the organization, which includes aligning security initiatives with business objectives, managing risk, and ensuring compliance with relevant laws and regulations. This strategic role not only helps in creating a robust security posture but also promotes a culture of security awareness throughout the organization. By having a dedicated executive responsible for security, it sends a clear message that the organization prioritizes information security and is committed to protecting its assets and stakeholders.
Why have MOST European countries developed specific legislation that permits police and security services to monitor communications traffic for specific purposes, such as the detection of crime?
What are the different methods that can be used as access controls?
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
Answer : C
Access controls are essential in information security for ensuring that resources are available to authorized users and protected from unauthorized access. The methods of access control can be categorized as follows:
Detective: These controls are designed to identify and record unauthorized access attempts. They do not prevent access but are useful for auditing and monitoring purposes.
Physical: Physical controls are tangible measures taken to protect assets, such as locks, fences, and security guards.
Preventive: Preventive controls are designed to stop unauthorized access before it happens. This includes mechanisms like passwords, biometric scans, and encryption.
The combination of detective, physical, and preventive controls provides a robust framework for managing access to sensitive information and systems. Reactive controls are not typically classified as access controls since they deal with responding to incidents after they occur, and virtual controls are not a recognized category in this context.
Which of the following types of organisation could be considered the MOST at risk from the theft of electronic based credit card data?
Answer : A
Online retailers are the most at risk for the theft of electronic-based credit card data due to the nature of their business, which involves processing a large volume of transactions over the internet. This exposes them to various cyber threats, including hacking, phishing, and other forms of cyber-attacks that can compromise credit card information. Traditional market traders, mail delivery businesses, and agricultural producers typically do not handle credit card transactions to the same extent or in the same electronic manner as online retailers, making them less likely targets for this specific type of data theft.
How might the effectiveness of a security awareness program be effectively measured?
1) Employees are required to take an online multiple choice exam on security principles.
2) Employees are tested with social engineering techniques by an approved penetration tester.
3) Employees practice ethical hacking techniques on organisation systems.
4) No security vulnerabilities are reported during an audit.
5) Open source intelligence gathering is undertaken on staff social media profiles.
Answer : D
The effectiveness of a security awareness program can be measured through various methods that assess both the knowledge and behavior of employees regarding security practices.
Online multiple choice exam on security principles: This method evaluates the employees' understanding of the security principles they have been taught. It's a direct measure of their knowledge and retention.
Testing with social engineering techniques by an approved penetration tester: This practical approach tests employees' reactions to real-life security threats, such as phishing or pretexting, which can indicate the effectiveness of the training in changing behavior.
Open source intelligence gathering on staff social media profiles: This method can reveal whether employees are adhering to security policies by not disclosing sensitive information publicly.
Option 3 is not a direct measure of a security awareness program's effectiveness, as practicing ethical hacking techniques is more about skills development rather than assessing awareness. Option 4, while important, does not directly measure the effectiveness of the security awareness program but rather the overall security posture of the organization.
Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?
Answer : A
ITIL (Information Technology Infrastructure Library) is a widely recognized framework that offers a comprehensive set of best practices for IT Service Management (ITSM). It assists organizations in aligning IT services with business goals, including security objectives. ITIL provides guidance on the entire service lifecycle, from service strategy and design to service transition, operation, and continual service improvement. By following ITIL's structured approach, organizations can enhance the quality of IT services, manage risk effectively, improve customer satisfaction, and ensure that IT and business strategies are in sync.
Which cryptographic protocol preceded Transport Layer Security (TLS)?
Answer : C
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
Answer : D
Botnets are typically used by attackers for a variety of malicious activities, most commonly for:
Generating and distributing spam messages: Botnets can send out large volumes of spam emails to promote products or services, or to distribute malware.
Conducting DDoS attacks: Distributed Denial of Service (DDoS) attacks are often carried out using botnets to overwhelm a target's servers with traffic.
Scanning for system & application vulnerabilities: Botnets can be used to scan a large number of systems for vulnerabilities that can be exploited in further attacks.
When securing a wireless network, which of the following is NOT best practice?
Why might the reporting of security incidents that involve personal data differ from other types of security incident?
Answer : C
Which of the following is NOT a valid statement to include in an organisation's security policy?
Answer : B
An organization's security policy should be a reflection of its own security stance and principles, not tailored to third parties. While it may be informed by third-party requirements, the policy itself should not be amended to suit all third-party contractors. This is because the security policy is meant to establish a clear set of rules and expectations for the organization's members to maintain the confidentiality, integrity, and availability of its data. It should be defined, approved by management, and communicated to employees and relevant external parties. Amending the policy to suit all third-party contractors could lead to a dilution of the security standards and potentially compromise the organization's security posture.
As well as being permitted to access, create, modify and delete information, what right does an Information Owner NORMALLY have in regard to their information?
Which of the following is MOST LIKELY to be described as a consequential loss?
Answer : A
Consequential loss in the context of information security refers to secondary or indirect damage that occurs as a result of a primary event or incident. It is not the immediate direct loss, such as theft of money or service disruption, but rather the subsequent impact that may not be immediately apparent. Reputation damage is a prime example of consequential loss because it is a secondary effect that can occur after a security breach or incident. The loss of trust by customers, partners, and stakeholders can have long-term negative effects on a business's financial health and market position. This type of loss is often more significant and lasting than the immediate direct costs associated with an incident.
What Is the KEY purpose of appending security classification labels to information?
Answer : A
The primary purpose of appending security classification labels to information is to guide the implementation of appropriate security controls. These labels indicate the level of sensitivity of the information and determine the extent and nature of the controls that need to be applied to protect it. For example, information classified as 'Confidential' will require stricter access controls compared to information classified as 'Public'. The classification labels help in ensuring that information is handled and protected in accordance with its importance to the organization, and in compliance with relevant legal and regulatory requirements.
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?
Answer : D
Developers should undergo Awareness Training to understand the security of the code they have written and how it can improve security defense while being attacked. This type of training educates developers on the importance of security considerations throughout the software development lifecycle (SDLC). It covers best practices for secure coding, common vulnerabilities and how to avoid them, and the impact of code security on the overall security posture of an application. By being aware of security principles and the potential threats, developers can write more secure code, which is crucial for defending against attacks.
In a security governance framework, which of the following publications would be at the HIGHEST level?
Answer : C
In a security governance framework, the policy is typically at the highest level because it defines the overall direction and principles that govern the security posture of an organization. Policies are high-level statements that provide guidance to all members of an organization and form the foundation upon which standards, procedures, and guidelines are built. They are approved by the highest levels of management and are meant to be more stable over time, providing a consistent framework for security across the organization.
You are undertaking a qualitative risk assessment of a likely security threat to an information system.
What is the MAIN issue with this type of risk assessment?
Answer : A
The main issue with qualitative risk assessments is their inherent subjectivity. Unlike quantitative assessments that use numerical data, qualitative assessments rely on the judgment and experience of the assessors to estimate risks. This can lead to inconsistencies if the criteria for ranking and categorizing risks are not clearly defined and agreed upon by all stakeholders involved in the assessment process. The subjective nature of this method can also influence the prioritization of risks, potentially affecting the decision-making process regarding which security controls to implement.
When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.
Answer : D
When outsourcing data processing, the original data owner has a legal duty of care to ensure that the third party is competent to process the data securely (1) and observes the same high standards as the data owner (2). This means that the third party must have the necessary skills, knowledge, and security measures in place to protect the data, and they must adhere to the same level of data protection and privacy standards as the original owner. Processing the data wherever it can be transferred (3) and archiving the data for the third party's own long-term usage (4) are not primary legal considerations and may, in fact, contravene data protection laws if done without proper safeguards and compliance with regulations.
Which types of organisations are likely to be the target of DDoS attacks?
Answer : D
Distributed Denial of Service (DDoS) attacks are a threat to any organization that maintains an online presence. This is because DDoS attacks are designed to overwhelm an organization's network with traffic, rendering it inaccessible to legitimate users. While cloud service providers, financial sector organizations, and online retail companies can be attractive targets due to their high-profile nature and the critical nature of their services, the reality is that any organization with an online presence can be targeted. This includes small businesses, educational institutions, government agencies, and non-profits. The motivation behind such attacks can vary from financial gain, to disruption of service, to political statements. Therefore, it's crucial for all organizations to implement robust security measures to mitigate the risk of DDoS attacks.
What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?
Answer : D
Quantitative risk assessment is the process of objectively measuring risk by assigning numerical values to the probability of an event occurring and its potential impact. This method is most likely to provide objective support for a security Return on Investment (ROI) case because it allows for the calculation of potential losses in monetary terms, which can be directly compared to the cost of implementing security measures. By quantifying risks and their financial implications, organizations can make informed decisions about where to allocate resources and how to prioritize security investments to maximize ROI. This approach is particularly useful when making a business case to stakeholders who require clear, financial justification for security expenditures.
Which of the following is NOT considered to be a form of computer misuse?
Answer : A
The term 'computer misuse' typically refers to activities that are illegal or unauthorized and involve a computer system. This includes illegal interception of information, illegal access to computer systems, and downloading of pirated software, as these actions are unauthorized and often involve breaching security measures. However, the illegal retention of personal data, while a serious privacy concern and potentially a legal issue, is not typically classified under the scope of 'computer misuse'. Instead, it falls under data protection and privacy regulations, which deal with the proper handling and storage of personal information.
When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?
Answer : A
In the context of information security, risk is typically calculated as the product of likelihood and impact. This formula encapsulates the probability of a vulnerability being exploited (likelihood) and the potential damage or loss that could result from such an event (impact). The goal is to quantify the level of risk in order to prioritize mitigation efforts effectively. Options B, C, and D do not represent standard risk calculation formulas in information security management.
Which of the following is NOT an information security specific vulnerability?
Answer : C
In the context of information security vulnerabilities, we are typically referring to weaknesses that can be exploited by threats to compromise the confidentiality, integrity, or availability of an information system. Options A, B, and D all represent potential vulnerabilities:
A: Use of HTTP for an Apache web server could allow for interception of data due to lack of encryption.
B: An unpatched Windows operating system could have known security flaws that can be exploited.
D: An unlocked filing cabinet could lead to unauthorized physical access to sensitive documents.
Option C, however, refers to the storage of confidential data in a fire safe, which is a protective measure rather than a vulnerability. A fire safe is designed to protect physical assets from damage or destruction, particularly in the event of a fire, and does not inherently contain a weakness that could be exploited by a cyber threat. Therefore, it is not considered an information security specific vulnerability.
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
Answer : D
Botnets are typically used by attackers for a variety of malicious activities, most commonly for:
Generating and distributing spam messages: Botnets can send out large volumes of spam emails to promote products or services, or to distribute malware.
Conducting DDoS attacks: Distributed Denial of Service (DDoS) attacks are often carried out using botnets to overwhelm a target's servers with traffic.
Scanning for system & application vulnerabilities: Botnets can be used to scan a large number of systems for vulnerabilities that can be exploited in further attacks.
Which of the following describes a qualitative risk assessment approach?
Answer : A
A qualitative risk assessment approach is characterized by the subjective analysis of the likelihood of a risk occurring and its potential impact. This method relies on the judgment and experience of the assessor to estimate the severity of a risk. It does not use numerical data or statistical methods, which are typical of quantitative assessments. Instead, it may use descriptors like 'low', 'medium', or 'high' to rate both the likelihood of occurrence and the potential impact. This approach is useful when precise data is unavailable or when assessing complex, multifaceted risks where human insight is valuable.
When securing a wireless network, which of the following is NOT best practice?
Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?
Answer : B
The General Data Protection Regulation (GDPR) is a regulation that applies to all organizations operating within the EU and also to organizations outside of the EU that offer goods or services to, or monitor the behavior of, EU data subjects. It is designed to harmonize data privacy laws across Europe and to protect and empower all EU citizens' data privacy. The GDPR's relevance extends beyond geographical and sector-specific boundaries because it applies to any organization that processes the personal data of individuals within the EU, making it a global standard for data protection.
While other options like Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA) have significant impacts on specific sectors or regions, GDPR's broad scope makes it relevant to a wide range of organizations worldwide. It sets a precedent for data protection laws globally, influencing other regulations and becoming a de facto standard for many companies, even in countries without similar laws.
What does a penetration test do that a Vulnerability Scan does NOT?
Answer : A
A penetration test, unlike a vulnerability scan, is an in-depth process where security professionals actively attempt to exploit vulnerabilities in a system. The goal is to simulate a real-world attack to understand how an attacker could exploit vulnerabilities and to determine the potential impact. This involves not just identifying vulnerabilities, as a scan does, but also attempting to exploit them to understand the full extent of the risk. Penetration tests are typically manual or semi-automated and involve a variety of tools and techniques to uncover and exploit security weaknesses, which can include common tools like Nmap, Nessus, and Metasploit.
Which membership based organisation produces international standards, which cover good practice for information assurance?
Answer : A
The British Standards Institution (BSI) is known for producing standards that cover good practices in various domains, including information assurance. BSI is the UK's national standards body and a founding member of the International Organization for Standardization (ISO). It contributes to the development of international standards through ISO, which provides frameworks and best practices for information security management systems (ISMS), such as the ISO/IEC 27000 series. These standards are designed to help organizations manage the security of assets such as financial information, intellectual property, employee details, and information entrusted by third parties.
When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles is considered BEST practice?
Answer : D
The best practice when handling and investigating digital evidence for use in a criminal cybercrime investigation is to ensure that digital devices are forensically ''clean'' before any investigation takes place. This means that the devices should be free from any potential contamination that could compromise the integrity of the evidence. It's crucial to maintain the original state of digital evidence as much as possible to ensure its admissibility in court. Altering digital evidence should be avoided unless it's absolutely necessary for the investigation, and even then, it should be done following strict protocols to document the changes made. While law enforcement often handles digital evidence, the principle of maintaining a forensically clean state applies universally to ensure the evidence remains untainted and reliable.
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?
Answer : D
Developers should undergo Awareness Training to understand the security of the code they have written and how it can improve security defense while being attacked. This type of training educates developers on the importance of security considerations throughout the software development lifecycle (SDLC). It covers best practices for secure coding, common vulnerabilities and how to avoid them, and the impact of code security on the overall security posture of an application. By being aware of security principles and the potential threats, developers can write more secure code, which is crucial for defending against attacks.
As well as being permitted to access, create, modify and delete information, what right does an Information Owner NORMALLY have in regard to their information?
Which types of organisations are likely to be the target of DDoS attacks?
Answer : D
Distributed Denial of Service (DDoS) attacks are a threat to any organization that maintains an online presence. This is because DDoS attacks are designed to overwhelm an organization's network with traffic, rendering it inaccessible to legitimate users. While cloud service providers, financial sector organizations, and online retail companies can be attractive targets due to their high-profile nature and the critical nature of their services, the reality is that any organization with an online presence can be targeted. This includes small businesses, educational institutions, government agencies, and non-profits. The motivation behind such attacks can vary from financial gain, to disruption of service, to political statements. Therefore, it's crucial for all organizations to implement robust security measures to mitigate the risk of DDoS attacks.
Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?
What Is the PRIMARY security concern associated with the practice known as Bring Your Own Device (BYOD) that might affect a large organisation?
Answer : B
Which standard deals with the implementation of business continuity?
Answer : C
The standard that deals specifically with the implementation of business continuity is ISO 22301, which is internationally recognized. It outlines the requirements for a business continuity management system (BCMS), which provides a framework for organizations to update, control, and deploy an effective BCMS that helps them to be prepared and respond effectively to disruptions. ISO/IEC 27001 is related to information security management systems (ISMS) and while it includes aspects of business continuity, it is not solely focused on it. COBIT is a framework for developing, implementing, monitoring, and improving IT governance and management practices, and BS5750 is a standard for quality management systems, now superseded by ISO 9000 series.
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
Answer : D
Defence in depth is a security concept that involves implementing multiple layers of security controls throughout an information system. The idea is that if one control fails or a vulnerability is exploited, other controls will provide redundancy and continue to protect the system. This approach is analogous to a physical fortress with multiple walls; if an attacker breaches one wall, additional barriers exist to stop them from progressing further. In the context of information security, this could include a combination of firewalls, intrusion detection systems, antivirus software, and strict access controls, among others. Defence in depth is designed to address security vulnerabilities not only in technology but also in processes and people, acknowledging that human error or negligence can often lead to security breaches.
Online retailers are the most at risk for the theft of electronic-based credit card data due to the nature of their business, which involves processing a large volume of transactions over the internet. This exposes them to various cyber threats, including hacking, phishing, and other forms of cyber-attacks that can compromise credit card information. Traditional market traders, mail delivery businesses, and agricultural producers typically do not handle credit card transactions to the same extent or in the same electronic manner as online retailers, making them less likely targets for this specific type of data theft.
Which of the following is an accepted strategic option for dealing with risk?
Answer : D
In the context of Information Security Management Principles, risk acceptance is a strategic option where an organization decides to accept the potential cost of a risk without taking any actions to mitigate it. This decision is typically made when the cost of mitigating the risk exceeds the cost of the risk's potential impact. Acceptance is part of the risk management process, which also includes risk identification, assessment, and treatment. When accepting a risk, it is crucial to document the decision and the rationale behind it, ensuring that it aligns with the organization's risk appetite and overall security policy.
Which of the following is often the final stage in the information management lifecycle?
Answer : A
The final stage in the information management lifecycle is often disposal. This stage involves the secure deletion or destruction of information that is no longer needed or has reached the end of its retention period. Proper disposal is crucial to prevent unauthorized access or recovery of sensitive data. It ensures compliance with data protection regulations and organizational policies regarding the retention and destruction of data.
What form of attack against an employee has the MOST impact on their compliance with the organisation's "code of conduct"?
Answer : B
Social engineering attacks are designed to exploit human psychology and manipulate individuals into breaking normal security procedures and best practices. These attacks have the most impact on an employee's compliance with an organization's code of conduct because they directly target the employee's behavior and decision-making process. By using deception, persuasion, or influence, attackers can coerce employees into divulging confidential information, providing access to restricted areas, or performing actions that go against the company's policies and ethical standards. This form of attack can lead to violations of the code of conduct, as employees may unknowingly or unwillingly engage in activities that compromise the organization's values and principles.
Which of the following is NOT considered to be a form of computer misuse?
Answer : A
The term 'computer misuse' typically refers to activities that are illegal or unauthorized and involve a computer system. This includes illegal interception of information, illegal access to computer systems, and downloading of pirated software, as these actions are unauthorized and often involve breaching security measures. However, the illegal retention of personal data, while a serious privacy concern and potentially a legal issue, is not typically classified under the scope of 'computer misuse'. Instead, it falls under data protection and privacy regulations, which deal with the proper handling and storage of personal information.
Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?
Answer : A
ITIL (Information Technology Infrastructure Library) is a widely recognized framework that offers a comprehensive set of best practices for IT Service Management (ITSM). It assists organizations in aligning IT services with business goals, including security objectives. ITIL provides guidance on the entire service lifecycle, from service strategy and design to service transition, operation, and continual service improvement. By following ITIL's structured approach, organizations can enhance the quality of IT services, manage risk effectively, improve customer satisfaction, and ensure that IT and business strategies are in sync.
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?
Answer : D
Developers should undergo Awareness Training to understand the security of the code they have written and how it can improve security defense while being attacked. This type of training educates developers on the importance of security considerations throughout the software development lifecycle (SDLC). It covers best practices for secure coding, common vulnerabilities and how to avoid them, and the impact of code security on the overall security posture of an application. By being aware of security principles and the potential threats, developers can write more secure code, which is crucial for defending against attacks.
In a security governance framework, which of the following publications would be at the HIGHEST level?
Answer : C
In a security governance framework, the policy is typically at the highest level because it defines the overall direction and principles that govern the security posture of an organization. Policies are high-level statements that provide guidance to all members of an organization and form the foundation upon which standards, procedures, and guidelines are built. They are approved by the highest levels of management and are meant to be more stable over time, providing a consistent framework for security across the organization.
Which types of organisations are likely to be the target of DDoS attacks?
Answer : D
Distributed Denial of Service (DDoS) attacks are a threat to any organization that maintains an online presence. This is because DDoS attacks are designed to overwhelm an organization's network with traffic, rendering it inaccessible to legitimate users. While cloud service providers, financial sector organizations, and online retail companies can be attractive targets due to their high-profile nature and the critical nature of their services, the reality is that any organization with an online presence can be targeted. This includes small businesses, educational institutions, government agencies, and non-profits. The motivation behind such attacks can vary from financial gain, to disruption of service, to political statements. Therefore, it's crucial for all organizations to implement robust security measures to mitigate the risk of DDoS attacks.
According to ISO/IEC 27000, which of the following is the definition of a vulnerability?
Answer : A
The term 'vulnerability' within the context of ISO/IEC 27000 refers to any weakness present in an asset or group of assets that could potentially be exploited by one or more threats. This definition aligns with the concept of vulnerability as a gap in protection efforts that, if not addressed, could allow a threat to compromise the confidentiality, integrity, or availability of an asset. It is important to note that vulnerabilities can be identified in various components of an organization's infrastructure, including hardware, software, processes, and even personnel. Effective information security management involves identifying these vulnerabilities through risk assessments and implementing appropriate controls to mitigate the risk of exploitation.
Why might the reporting of security incidents that involve personal data differ from other types of security incident?
Answer : C
What Is the PRIMARY difference between DevOps and DevSecOps?
Answer : C
The primary difference between DevOps and DevSecOps lies in the integration of security practices. DevOps is a methodology that emphasizes collaboration between development and operations teams to automate the software development process, including continuous integration (CI) and continuous delivery (CD). However, DevOps does not inherently prioritize security as part of the development process.
DevSecOps, on the other hand, extends the DevOps principles by integrating security into every aspect of the software development lifecycle. This approach is often summarized by the term ''shift-left,'' which means incorporating security from the beginning and throughout the development process, rather than treating it as an afterthought or a final step before deployment. In DevSecOps, security is considered a shared responsibility among all team members, and it is addressed through continuous security processes that are as integral as CI/CD in the DevOps culture.
Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?
Answer : B
The deployment of end-to-end Internet of Things (IoT) solutions significantly increases the attack surface compared to traditional IT systems. This is due to the vast number of connected devices, each potentially introducing new vulnerabilities. The heterogeneity of these devices, often with varying levels of security, can lead to more entry points for cyberattacks. Additionally, the complexity of managing and securing these numerous devices, especially when they use different communication protocols and standards, exacerbates the risk. Therefore, the expansion of the attack surface is considered the greatest risk because it amplifies the potential for unauthorized access and compromises the integrity, availability, and confidentiality of information systems.
Which membership based organisation produces international standards, which cover good practice for information assurance?
Answer : A
The British Standards Institution (BSI) is known for producing standards that cover good practices in various domains, including information assurance. BSI is the UK's national standards body and a founding member of the International Organization for Standardization (ISO). It contributes to the development of international standards through ISO, which provides frameworks and best practices for information security management systems (ISMS), such as the ISO/IEC 27000 series. These standards are designed to help organizations manage the security of assets such as financial information, intellectual property, employee details, and information entrusted by third parties.
What aspect of an employee's contract of employment Is designed to prevent the unauthorised release of confidential data to third parties even after an employee has left their employment?
Answer : B
Non-disclosure agreements (NDAs) are legal contracts that are designed to protect sensitive information. They are a critical part of an employee's contract of employment to ensure that confidential data is not released to unauthorized third parties. NDAs are specifically intended to prevent the disclosure of confidential information both during the period of employment and after the employee has left the organization. This is essential for maintaining the integrity and confidentiality of proprietary information which could include trade secrets, client data, and other types of sensitive information.
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?
Answer : B
The General Data Protection Regulation (GDPR) is a regulation that applies to all organizations operating within the EU and also to organizations outside of the EU that offer goods or services to, or monitor the behavior of, EU data subjects. It is designed to harmonize data privacy laws across Europe and to protect and empower all EU citizens' data privacy. The GDPR's relevance extends beyond geographical and sector-specific boundaries because it applies to any organization that processes the personal data of individuals within the EU, making it a global standard for data protection.
While other options like Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA) have significant impacts on specific sectors or regions, GDPR's broad scope makes it relevant to a wide range of organizations worldwide. It sets a precedent for data protection laws globally, influencing other regulations and becoming a de facto standard for many companies, even in countries without similar laws.
Which of the following is often the final stage in the information management lifecycle?
Answer : A
The final stage in the information management lifecycle is often disposal. This stage involves the secure deletion or destruction of information that is no longer needed or has reached the end of its retention period. Proper disposal is crucial to prevent unauthorized access or recovery of sensitive data. It ensures compliance with data protection regulations and organizational policies regarding the retention and destruction of data.
Which standard deals with the implementation of business continuity?
Answer : C
The standard that deals specifically with the implementation of business continuity is ISO 22301, which is internationally recognized. It outlines the requirements for a business continuity management system (BCMS), which provides a framework for organizations to update, control, and deploy an effective BCMS that helps them to be prepared and respond effectively to disruptions. ISO/IEC 27001 is related to information security management systems (ISMS) and while it includes aspects of business continuity, it is not solely focused on it. COBIT is a framework for developing, implementing, monitoring, and improving IT governance and management practices, and BS5750 is a standard for quality management systems, now superseded by ISO 9000 series.
Why have MOST European countries developed specific legislation that permits police and security services to monitor communications traffic for specific purposes, such as the detection of crime?
Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?
Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.
Which of the following types of organisation could be considered the MOST at risk from the theft of electronic based credit card data?
Answer : A
Online retailers are the most at risk for the theft of electronic-based credit card data due to the nature of their business, which involves processing a large volume of transactions over the internet. This exposes them to various cyber threats, including hacking, phishing, and other forms of cyber-attacks that can compromise credit card information. Traditional market traders, mail delivery businesses, and agricultural producers typically do not handle credit card transactions to the same extent or in the same electronic manner as online retailers, making them less likely targets for this specific type of data theft.
What type of attack attempts to exploit the trust relationship between a user client based browser and server based websites forcing the submission of an authenticated request to a third party site?
Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD) within the Information Security sphere?
Answer : B
The field of Information Security is dynamic and evolves rapidly, with new threats and technologies emerging regularly. Continual Professional Development (CPD) is crucial in this sphere to ensure that professionals stay up-to-date with the latest security trends, practices, and technologies. CPD enables information security professionals to maintain and enhance their knowledge and skills, which is vital for effectively protecting organizations against the ever-changing threat landscape. This ongoing learning process is not just about retaining credibility or meeting the requirements of professional bodies; it's about ensuring that professionals can respond to new challenges and remain effective in their roles.
What are the different methods that can be used as access controls?
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
Answer : C
Access controls are essential in information security for ensuring that resources are available to authorized users and protected from unauthorized access. The methods of access control can be categorized as follows:
Detective: These controls are designed to identify and record unauthorized access attempts. They do not prevent access but are useful for auditing and monitoring purposes.
Physical: Physical controls are tangible measures taken to protect assets, such as locks, fences, and security guards.
Preventive: Preventive controls are designed to stop unauthorized access before it happens. This includes mechanisms like passwords, biometric scans, and encryption.
The combination of detective, physical, and preventive controls provides a robust framework for managing access to sensitive information and systems. Reactive controls are not typically classified as access controls since they deal with responding to incidents after they occur, and virtual controls are not a recognized category in this context.
According to ISO/IEC 27000, which of the following is the definition of a vulnerability?
Answer : A
The term 'vulnerability' within the context of ISO/IEC 27000 refers to any weakness present in an asset or group of assets that could potentially be exploited by one or more threats. This definition aligns with the concept of vulnerability as a gap in protection efforts that, if not addressed, could allow a threat to compromise the confidentiality, integrity, or availability of an asset. It is important to note that vulnerabilities can be identified in various components of an organization's infrastructure, including hardware, software, processes, and even personnel. Effective information security management involves identifying these vulnerabilities through risk assessments and implementing appropriate controls to mitigate the risk of exploitation.
Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?
Answer : B
The General Data Protection Regulation (GDPR) is a regulation that applies to all organizations operating within the EU and also to organizations outside of the EU that offer goods or services to, or monitor the behavior of, EU data subjects. It is designed to harmonize data privacy laws across Europe and to protect and empower all EU citizens' data privacy. The GDPR's relevance extends beyond geographical and sector-specific boundaries because it applies to any organization that processes the personal data of individuals within the EU, making it a global standard for data protection.
While other options like Sarbanes-Oxley (SOX) and the Health Insurance Portability and Accountability Act (HIPAA) have significant impacts on specific sectors or regions, GDPR's broad scope makes it relevant to a wide range of organizations worldwide. It sets a precedent for data protection laws globally, influencing other regulations and becoming a de facto standard for many companies, even in countries without similar laws.
Which of the following is an asymmetric encryption algorithm?
Answer : D
RSA (Rivest-Shamir-Adleman) is a widely accepted asymmetric encryption algorithm. Unlike symmetric algorithms, which use the same key for both encryption and decryption, asymmetric algorithms use a pair of keys -- a public key for encryption and a private key for decryption. This method allows for secure key exchange over an insecure channel without the need to share the private key. RSA operates on the principle that it is easy to multiply large prime numbers together to create a product, but it is hard to reverse the process, i.e., to factorize the product back into the original primes. This one-way function underpins the security of RSA.
What advantage does the delivery of online security training material have over the distribution of printed media?
Answer : A
While option C mentions a 'discoverable record,' this refers to the legal concept that materials may be used as evidence in litigation. However, this is not an advantage of online over printed media, as both can be discoverable. Option B's claim that online materials are intrinsically more accurate is not necessarily true, as accuracy depends on the content's quality, not the delivery method. Option D is incorrect because while online materials are protected by copyright laws, this is not an exclusive benefit over printed materials, which are also protected.
Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on information security?
Answer : B
The global pandemic has accelerated the trend of remote work, which inherently increases the risk of information security breaches due to insecure premises (A) and the need for additional tools like VPNs . There's also a higher likelihood of attackers exploiting vulnerabilities during such operational changes (D). However, the need for additional physical security at data centres and corporate headquarters (B) is less likely to be a direct result of a pandemic since the focus shifts to remote work and digital security rather than physical premises that are less occupied.