As well as being permitted to access, create, modify and delete information, what right does an Information Owner NORMALLY have in regard to their information?
How might the effectiveness of a security awareness program be effectively measured?
1) Employees are required to take an online multiple choice exam on security principles.
2) Employees are tested with social engineering techniques by an approved penetration tester.
3) Employees practice ethical hacking techniques on organisation systems.
4) No security vulnerabilities are reported during an audit.
5) Open source intelligence gathering is undertaken on staff social media profiles.
Ensuring the correctness of data inputted to a system is an example of which facet of information security?
Why might the reporting of security incidents that involve personal data differ from other types of security incident?
When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always be taken into consideration?
What type of attack attempts to exploit the trust relationship between a user client based browser and server based websites forcing the submission of an authenticated request to a third party site?
Why should a loading bay NEVER be used as a staff entrance?
Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?
When a digital forensics investigator is conducting art investigation and handling the original data, what KEY principle must they adhere to?
When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?
What Is the root cause as to why SMS messages are open to attackers and abuse?
A security analyst has been asked to provide a triple A service (AAA) for both wireless and remote access network services in an organization and must avoid using proprietary solutions.
What technology SHOULD they adapt?
Which of the following is an asymmetric encryption algorithm?
What are the different methods that can be used as access controls?
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
Which of the following describes a qualitative risk assessment approach?
Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.
Which security framework impacts on organisations that accept credit cards, process credit card transactions, store relevant data or transmit credit card data?
Which three of the following characteristics form the AAA Triad in Information Security?
1. Authentication
2. Availability
3. Accounting
4. Asymmetry
5. Authorisation
When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.
Why is it prudent for Third Parties to be contracted to meet specific security standards?
Which of the following international standards deals with the retention of records?
Which of the following is NOT an information security specific vulnerability?
Which of the following statements relating to digital signatures is TRUE?
Which of the following is a framework and methodology for Enterprise Security Architecture and Service Management?
Which standards framework offers a set of IT Service Management best practices to assist organisations in aligning IT service delivery with business goals - including security goals?
Which of the following testing methodologies TYPICALLY involves code analysis in an offline environment without ever actually executing the code?
What aspect of an employee's contract of employment Is designed to prevent the unauthorised release of confidential data to third parties even after an employee has left their employment?
Which of the following is NOT considered to be a form of computer misuse?
Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?
What type of attack could directly affect the confidentiality of an unencrypted VoIP network?