Which organizational structure blends elements of functional and project organizational models to create a hybrid reporting structure?
Effective information security management programs require the active involvement of_________
Which of the following set of processes is considered to be one of the cornerstone cycles of the International Organization for Standardization (ISO) 27001 standard?
Risk appetite is typically determined by which of the following organizational functions?
Enforcing the implementation and management of security controls within services or products offered by third-party providers is a vital component of which security program service to the business?
During an initial investigation, the Incident Response Team suspects criminal activity but cannot initially prove or disprove illegal actions. What is the MOST critical action they should take?
Risk appetite directly affects what part of a vulnerability management program?
A newly-hired CISO needs to understand the organization’s financial management standards for business units
and operations. Which of the following would be the best source of this information?
A university recently hired a CISO. One of the first tasks is to develop a continuity of operations plan (COOP).
In developing the business impact assessment (BIA), which of the following MOST closely relate to the data backup and restoral?
Which is the single MOST important factor for introducing digital evidence into a court of law?
Which of the following tests is an IS auditor performing when a sample of programs is selected to determine if the source and object versions are the same?
Which of the following is the MOST critical step when establishing a security governance program?
Which of the following is a benefit of a risk-based approach to audit planning?
Which of the following functions evaluates patches used to close software vulnerabilities of new systems to assure compliance with policy when implementing an information security program?
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
1.Covering tracks
2.Scanning and enumeration
3.Maintaining Access
4.Reconnaissance
5.Gaining Access