Question 1: An engineer for a small company is trying to explain the importance of security to the company's owner. The owner feels the company does not need permissions added to the shared drive containing highly sensitive information. What security concept means that information can only be read by people who have been explicitly authorized to access it?
Question 2: A small business owner is concerned that, despite having permissions set on a shared drive, they couldn't determine who deleted an important file. An IT engineer recommends enabling file auditing to ensure all user actions are tracked and recorded. What security principle does this support?
Question 3: A newly hired Chief Information Security Officer (CISO) is implementing the National Institute of Standards and Technology (NIST) Cybersecurity Framework. What first function would help the CISO better develop the company's security policies, such as acceptable use policy (AUP), and build out recommendations for security controls?
Question 4: After implementing the National Institute of Standards and Technology (NIST) Cybersecurity Framework, the CISO is assessing the company's security posture to identify deficiencies from the framework's recommendations. What process can the CISO run to get a better sense of what the company needs to improve upon?
Question 5: A medium-sized mechanical engineering firm wants to better define the account creation process during the onboarding of new hires. It is looking to ensure that the new hires have the right programs, file permissions, and security controls completed ahead of time through automation. What modern access control implementation would aid the company’s account creation process?
Question 6: What component of modern access controls determines what rights a user should have on each resource?
Question 7: After a recent server outage, the company discovered an employee accidentally unplugged the power cable from a server housed in an unsecured closet. What security control did the company lack that led to the server outage?
Question 8: After a server outage due to a security breach, a company has taken several steps to recover from the incident. They have restored critical data from the latest backups and applied urgent security patches to address the exploited vulnerabilities. The security team has updated the incident response plan to incorporate lessons learned from the breach. What category of security control functional type BEST describes the function of these recent implementations?
Question 9: An information technology manager audited the company's support tickets and decided to implement a new standard operating procedure. The manager noticed a trend with the tickets, where the majority were for new computer setups. What security control function would the manager's implementation of a new standard operating procedure have?
Question 10: An information technology (IT) department is growing to a size where there is a need for a new group to manage security. The chief executive officer (CEO) wants to hire a new executive officer for the role and split it into its own department, separate from the IT department. The CEO should hire for which position?
Question 11: A newly hired CISO met with the human resources (HR) department to discuss how to better secure the company’s access to sensitive information. In what way does this meeting fall under the responsibility of the new CISO?
Question 12: After a company hires a new CISO, the Chief Executive Officer (CEO) requests the CISO to hire staff for the new team. The purview of the team will be for monitoring and protecting critical information assets throughout the company. What BEST describes the location of this new team within the structure of the company?
Question 13: An organization is installing an Uninterruptible Power Supply for their new data center. Which of the following would BEST describe this type of control?
Question 14: A web-based manufacturing company processes monthly charges to credit card information saved in the customer's profile. Which of the following standards would be required to maintain this payment information securely?
Question 15: You have implemented a secure web gateway that blocks access to a social networking site. How would you categorize this type of security control?
Question 16: If a company wants to ensure it is following best practice in choosing security controls, what type of resource would provide guidance?
Question 17: A business is expanding rapidly and the owner is worried about arguments between its established SOC and programming/coding departments. What type of security business unit or function could help to resolve these issues?
Question 18: What are the properties of a secure information processing system?
Question 19: Security awareness training, background checks, and written security policies are examples of which control category?
Question 20: Which of the following is the BEST example of a deterrent control?