ABC Limited has recently suffered a security breach with customers’ social security number available on the dark web for sale. The CISO, during the time of the incident, has been fired, and you have been hired as the replacement. The analysis of the breach found that the absence of an insider threat program, lack of least privilege policy, and weak access control was to blame. You would like to implement key performance indicators to mitigate the risk.
Which metric would meet the requirement?
The formal certification and accreditation process has four primary steps, what are they?
Which of the following are the MOST important factors for proactively determining system vulnerabilities?
Creating a secondary authentication process for network access would be an example of?
Which of the following conditions would be the MOST probable reason for a security project to be rejected by the executive board of an organization?
Which is the BEST solution to monitor, measure, and report changes to critical data in a system?
The Security Operations Center (SOC) just purchased a new intrusion prevention system (IPS) that needs to be deployed in-line for best defense. The IT group is concerned about putting the new IPS in-line because it might negatively impact network availability. What would be the BEST approach for the CISO to reassure the IT group?
You have purchased a new insurance policy as part of your risk strategy. Which of the following risk strategy options have you engaged in?
As the Chief Information Security Officer, you are performing an assessment of security posture to understand
what your Defense-in-Depth capabilities are. Which network security technology examines network traffic flows
to detect and actively stop vulnerability exploits and attacks?
An organization has implemented a change management process for all changes to the IT production environment. This change management process follows best practices and is expected to help stabilize the availability and integrity of the organization’s IT environment. Which of the following can be used to measure the effectiveness of this newly implemented process:
Which of the following is a countermeasure to prevent unauthorized database access from Web applications?
What process evaluates technical and non-technical security controls to validate that an implementation meets a specific set of security requirements?
When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?