Why is it prudent for Third Parties to be contracted to meet specific security standards?
As well as being permitted to access, create, modify and delete information, what right does an Information Owner NORMALLY have in regard to their information?
A penetration tester undertaking a port scan of a client's network, discovers a host which responds to requests on TCP ports 22, 80, 443, 3306 and 8080.
What type of device has MOST LIKELY been discovered?
Which of the following is an asymmetric encryption algorithm?
How might the effectiveness of a security awareness program be effectively measured?
1) Employees are required to take an online multiple choice exam on security principles.
2) Employees are tested with social engineering techniques by an approved penetration tester.
3) Employees practice ethical hacking techniques on organisation systems.
4) No security vulnerabilities are reported during an audit.
5) Open source intelligence gathering is undertaken on staff social media profiles.
Which of the following describes a qualitative risk assessment approach?
What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?
Which of the following international standards deals with the retention of records?
Which standard deals with the implementation of business continuity?
Which of the following is the MOST important reason for undertaking Continual Professional Development (CPD) within the Information Security sphere?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
BCS Free Exams |
---|
![]() |