AAA Triad in Information Security - Answers Authentication, Accounting, Authorisation
Accountability - Answers Acknowledgement and acceptance of ownership of actions, decisions, policies
and deliverables
Defence in depth - Answers Provides redundancy in the event a security control failure or vulnerability
In security governance, which publication is at the highest level? - Answers Policy
What is considered the greatest risk to information systems that results from deploying end-to-end
Internet of Things (IoT) solutions? - Answers Much larger attack surface than traditional IT systems
How is risk calculated - Answers Risk = likelihood * impact
Key purpose of appending security classification labels to information? - Answers To provide guidance
and instruction on implementing appropriate security controls to protect the information
What statutory requirement is relevant no matter which sector or geographical location someone is in? -
Answers GDPR
To better improve security culture within an org. with top down approach, what action is most effective?
- Answers Adopting "clear desk" policy
What form of risk assessment most likely to provide objective support for a security return on a
investment case? - Answers Quantitative
What is covered by ISO/IEC 27000 series? - Answers Forensic recovery of data, Data deduplication, data
protection and privacy
What is not a form of computer misuse? - Answers Illegal retention of personal data
Which membership based organisation produces international standards, which cover good practice for
information assurance? - Answers BSI
Which standards framework offers a set of IT Service Management best practices to assist organisations
in aligning IT service delivery with business goals - including security goals? - Answers ITIL
Which security framework impacts on organisations that accept credit cards, process credit card
transactions, store relevant data or transmit credit card data? - Answers PCI DSS
Which of the following international standards deals with the retention of records? - Answers IS015489
Once data has been created In a standard information lifecycle, what step TYPICALLY happens next? -
Answers Data Storage