3 Months Free Update
3 Months Free Update
3 Months Free Update
What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controls procedures during a critical emergency situation?
When establishing objectives for physical security environments, which of the following functional controls SHOULD occur first?
For which security-related reason SHOULD staff monitoring critical CCTV systems be rotated regularly during each work session?
Which security framework impacts on organisations that accept credit cards, process credit card transactions, store relevant data or transmit credit card data?
Which of the following is NOT an information security specific vulnerability?
When a digital forensics investigator is conducting art investigation and handling the original data, what KEY principle must they adhere to?
What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
Which of the following is MOST LIKELY to be described as a consequential loss?
Which membership based organisation produces international standards, which cover good practice for information assurance?
What physical security control would be used to broadcast false emanations to mask the presence of true electromagentic emanations from genuine computing equipment?
Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?
The policies, processes, practices, and tools used to align the business value of information with the most appropriate and cost-effective infrastructure from the time information is conceived through its final disposition.
Which of the below business practices does this statement define?
Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?
One traditional use of a SIEM appliance is to monitor for exceptions received via syslog.
What system from the following does NOT natively support syslog events?
When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles is considered BEST practice?
As well as being permitted to access, create, modify and delete information, what right does an Information Owner NORMALLY have in regard to their information?
Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.
When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?
In order to better improve the security culture within an organisation with a top down approach, which of the following actions at board level is the MOST effective?
Why have MOST European countries developed specific legislation that permits police and security services to monitor communications traffic for specific purposes, such as the detection of crime?
Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?
When preserving a crime scene for digital evidence, what actions SHOULD a first responder initially make?