Which of the following subjects is UNLIKELY to form part of a cloud service provision laaS contract?
Which of the following compliance legal requirements are covered by the ISO/IEC 27000 series?
1. Intellectual Property Rights.
2. Protection of Organisational Records
3. Forensic recovery of data.
4. Data Deduplication.
5. Data Protection & Privacy.
You are undertaking a qualitative risk assessment of a likely security threat to an information system.
What is the MAIN issue with this type of risk assessment?
Geoff wants to ensure the application of consistent security settings to devices used throughout his organisation whether as part of a mobile computing or a BYOD approach.
What technology would be MOST beneficial to his organisation?
In order to maintain the currency of risk countermeasures, how often SHOULD an organisation review these risks?
When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles is considered BEST practice?
Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD) within the Information Security sphere?
Why is it prudent for Third Parties to be contracted to meet specific security standards?
Which three of the following characteristics form the AAA Triad in Information Security?
1. Authentication
2. Availability
3. Accounting
4. Asymmetry
5. Authorisation
Which algorithm is a current specification for the encryption of electronic data established by NIST?
In a virtualised cloud environment, what component is responsible for the secure separation between guest machines?
When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.
When preserving a crime scene for digital evidence, what actions SHOULD a first responder initially make?
Which of the following describes a qualitative risk assessment approach?
Which standard deals with the implementation of business continuity?
Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?
Which of the following testing methodologies TYPICALLY involves code analysis in an offline environment without ever actually executing the code?
Ensuring the correctness of data inputted to a system is an example of which facet of information security?
Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?
What Is the PRIMARY security concern associated with the practice known as Bring Your Own Device (BYOD) that might affect a large organisation?
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
Which term describes the acknowledgement and acceptance of ownership of actions, decisions, policies and deliverables?
Which of the following is NOT an information security specific vulnerability?
What physical security control would be used to broadcast false emanations to mask the presence of true electromagentic emanations from genuine computing equipment?
Which of the following international standards deals with the retention of records?
What Is the root cause as to why SMS messages are open to attackers and abuse?
When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always be taken into consideration?
What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controls procedures during a critical emergency situation?
Why might the reporting of security incidents that involve personal data differ from other types of security incident?
Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?