Which of the following terms is used to describe the unexpected expansion of project deliverables?
A consultant is hired to do physical penetration testing at a large financial company. In the first day of his
assessment, the consultant goes to the company’s building dressed like an electrician and waits in the lobby for
an employee to pass through the main access gate, then the consultant follows the employee behind to get into
the restricted area. Which type of attack did the consultant perform?
Which of the following terms is defined as the friction or opposition resulting from actual or perceived differences or incompatibilities?
Which of the following statements below regarding Key Performance indicators (KPIs) are true?
What is one key difference between Capital expenditures and Operating expenditures?
A global retail company is creating a new compliance management process. Which of the following standards would be of PRIMARY importance?
A business unit within your organization intends to deploy a new technology in a manner that places it in violation of existing information security standards. What immediate action should the information security manager take?
Within an organization’s vulnerability management program, who has the responsibility to implement remediation actions?
Scenario: You are the CISO and are required to brief the C-level executive team on your information security audit for the year. During your review of the audit findings you discover that many of the controls that were put in place the previous year to correct some of the findings are not performing as needed. You have thirty days until the briefing.
To formulate a remediation plan for the non-performing controls what other document do you need to review before adjusting the controls?
A newly-hired CISO needs to understand the organization’s financial management standards for business units
and operations. Which of the following would be the best source of this information?
When measuring the effectiveness of an Information Security Management System which one of the following would be MOST LIKELY used as a metric framework?
Effective information security management programs require the active involvement of_________