Sample Questions:
The main objective of the Strategic Information Safety Plan is as follows:
Develop a plan for risk assessment.
Develop a plan to protect the data.
Protect assets and information resources.
Establish security management.
None
Which of the following, using public key cryptography, provides authentication, confidentiality and non-repudiation messages?
Encryption is the first private key of the recipient and the second public key.
Encryption is the first private key of the sender and the public key of the second recipient.
Encryption first sender and the second decryption of secret key using the public key of the sender
Encryption is the first public key of the sender and the second private key of the recipient.
None
The main mail server of a financial institution is committed to the root level; The only way to ensure that the system is safe to be as follows:
To change the system password
Implement multifactor authentication.
Restore the system to the original installation media.
Turn off the mail server on the network.
None
It is said that it is said that when a new application in production, it is not necessary to update the business impact analysis (BIA), since it does not produce changes in business processes. Information security manager must:
Check the solution with the business units.
Check the risks of the analysis system.
Recommended update after reviewing the implementation of the publication.
Request a review of the audit.
None
In a study of the risk assessment carried out by the organization, it said there is no segmentation of the local network (LAN). Network segmentation will reduce the potential impact below?
Denial Service Attacks (two)
Traffic sniffing
Viral infections
IP address spoofing
None
The main objective of the Internet use policy to prevent:
Access to undesirable sites.
Download malicious code.
Violation of copyright laws.
Violation of Internet access.
None
Internal review of Web-based applications The system can access the accounts of all employees by changing the identification of the employee to the URL, used to access the account. The identified vulnerability:
Rotal authentication
Not confident entry.
Scripts of cross sites.
Structured injection of consultation (SQL).
None