1.
2. Masquerading is:
Correct Answer
B. Pretending to be an authorized user
Explanation
Answer b:
Pretending to be the authorized user.
2.
3. Integrity is protection of data from all of the following EXCEPT:
Correct Answer
C. Data analysis
Explanation
Answer c:
Integrity is the protection of system information or processes from intentional or accidental unauthorized changes. Data analysis would usually be associated with confidentiality.
3.
4. A security program cannot address which of the following business goals?
Correct Answer
C. User expectations
Explanation
A security program focuses on protecting an organization's assets, information, and resources from unauthorized access, threats, and vulnerabilities. While user expectations are important for overall user satisfaction and experience, they are not directly addressed by a security program. The other options (A, B, and D) are all aspects that a security program can address to varying degrees.
4.
5. In most cases, integrity is enforced through:
Correct Answer
D. Access controls
Explanation
Answer d:
Integrity depends on access controls; therefore, it is necessary to positively and uniquely identify and authorize all persons who attempt access.
Answers a and b are good but not thorough enough on their own — they are portions of a complete access control system.
5.
7. In an accounting department, several people are required to complete a financial process. This is most likely an example of:
Correct Answer
A. Segregation of duties
Explanation
Answer a:
No single employee has control of a transaction from beginning to end; two or more people should be responsible for performing it.
6.
8. Risk Management is commonly understood as all of the following EXCEPT:
Correct Answer
D. Likelihood of a risk occurring
Explanation
Answer d:
The processes of identifying, analyzing, and assessing, mitigating, or transferring risk is generally characterized as risk management.
7.
9. The percentage or degree of damage inflicted on an asset used in the calculation of single loss expectancy can be referred to as:
Correct Answer
A. Exposure Factor (EF)
Explanation
Answer a:
This factor represents a measure of the magnitude of loss or
impact on the value of an asset. It is expressed as a percent, ranging from 0% to 100%, of asset value loss arising from a threat event. This factor is used in the calculation of single loss expectancy (SLE).
8.
10. The absence of a fire-suppression system would be best characterized as a(n):
Correct Answer
C. Vulnerability
Explanation
Answer c:
This term characterizes the absence or weakness of a risk-reducing safeguard.
9.
11. Risk Assessment includes all of the following EXCEPT:
Correct Answer
A. Implementation of effective countermeasures
Explanation
Answer a:
Fundamental applications of risk assessment to be addressed
include (1) determining the current status of information security in the target environment(s) and ensuring that associated risk is managed (accepted, mitigated, or transferred) according to policy, and (2) assessing risk strategically.
10.
12. A risk management project may be subject to overlooking certain types of threats. What can assist the risk management team to prevent that?
Correct Answer
A. Automated tools
Explanation
Answer a:
The best automated tools currently available include a well researched threat population and associated statistics. Using one of these tools virtually assures that no relevant threat is overlooked.
11.
13. Data classification can assist an organization in:
Correct Answer
C. Reducing costs for protecting data
Explanation
Answer c:
Data classification is intended to lower the cost of overprotecting all data.
12.
Who “owns” an organization’s data?
Correct Answer
D. Business units
Explanation
Answer d:
The business units, not IT (information technology), own the
data. Decisions regarding who has what access, what classification the data should be assigned, etc., are decisions that rest solely with the business data owner and based on organization policy.
13.
15. An information security policy does NOT usually include:
Correct Answer
B. Guidelines for how to implement policy
Explanation
Answer b:
Policy is written at a very high level and is intended to describe the “whats” of information security. Procedures, standards, baselines, and guidelines are the “hows” for implementation of the policy.
14.
16. The role of an information custodian should NOT include:
Correct Answer
C. Establishing retention periods for data
Explanation
Answer c:
Ensure record retention requirements are met based on the information owner’s analysis.
15.
17. A main objective of awareness training is:
Correct Answer
A. Provide understanding of responsibilities
Explanation
Answer a:
All employees must understand their basic security responsibilities.
16.
18. What is a primary target of a person employing social engineering?
Correct Answer
A. An individual
Explanation
Answer a:
Social engineering deals with individual dynamics as opposed to group dynamics, as the primary targets are help desks and/or administrative or technical support people.
17.
19. Social engineering can take many forms EXCEPT:
Correct Answer
D. Eavesdropping
Explanation
Social engineering is a manipulation tactic used to deceive individuals into divulging confidential information or taking certain actions. While it can involve tactics like dumpster diving (searching through trash for information), coercion, or sympathy, eavesdropping typically refers to the act of secretly listening to conversations, which is a different method of information gathering rather than manipulation.
18.
20. Incident response planning can be instrumental in:
Correct Answer
C. Reducing the impact of an adverse event on the organization
Explanation
Answer c:
The goals of a well-prepared incident response team are to detect potential information security breaches and provide an effective and efficient means of dealing with the situation in a manner that reduces the potential impact to the corporation.