2025 “ 2026 ACTUAL EXAM 650 QUESTIONS AND CORRECT
ANSWEERS GUARANTEE OVER 85% PASSMARK
Which of the following tools is MOST appropriate for determining how long a security project will take
to implement? - correct answer -Critical path
When speaking to an organization's human resources department about information security, an
information security manager should focus on the need for: - correct answer -security awareness
training for employees.
Good information security standards should: - correct answer -define precise and unambiguous
allowable limits.
Security awareness training should be provided to new employees: - correct answer -before they have
access to data.
What is the BEST method to verify that all security patches applied to servers were properly
documented? - correct answer -Trace OS patch logs to change control requests
A security awareness program should: - correct answer -address specific groups and roles.
The PRIMARY objective of security awareness is to: - correct answer -influence employee behavior.
Which of the following will BEST protect against malicious activity by a former employee? - correct
answer -Effective termination procedures
Which of the following represents a PRIMARY area of interest when conducting a penetration test? -
correct answer -Network mapping
,The return on investment of information security can BEST be evaluated through which of the following?
- correct answer -Support of business objectives
To help ensure that contract personnel do not obtain unauthorized access to sensitive information, an
information security manager should PRIMARILY: - correct answer -avoid granting system
administration roles.
Information security policies should: - correct answer -be straightforward and easy to understand.
Which of the following is the BEST way to ensure that a corporate network is adequately secured against
external attack? - correct answer -Perform periodic penetration testing.
Which of the following presents the GREATEST exposure to internal attack on a network? - correct
answer -User passwords are encoded but not encrypted
Which of the following provides the linkage to ensure that procedures are correctly aligned with
information security policy requirements? - correct answer -Standards
Which of the following are the MOST important individuals to include as members of an information
security steering committee? - correct answer -IT management and key business process owners
Security audit reviews should PRIMARILY: - correct answer -ensure that controls operate as required.
Which of the following is the MOST appropriate method to protect a password that opens a confidential
file? - correct answer -Out-of-band channels
What is the MOST effective access control method to prevent users from sharing files with unauthorized
users? - correct answer -Mandatory
Which of the following is an inherent weakness of signature-based intrusion detection systems? -
correct answer -New attack methods will be missed
,Data owners are normally responsible for which of the following? - correct answer -Determining the
level of application security required
Which of the following is the MOST appropriate individual to ensure that new exposures have not been
introduced into an existing application during the change management process? - correct answer -
System user
What is the BEST way to ensure users comply with organizational security requirements for password
complexity? - correct answer -Enable system-enforced password configuration
Which of the following is the MOST appropriate method for deploying operating system (OS) patches to
production application servers? - correct answer -Initially load the patches on a test machine
Which of the following would present the GREATEST risk to information security? - correct answer -
Security incidents are investigated within five business days
The PRIMARY reason for using metrics to evaluate information security is to: - correct answer -enable
steady improvement.
What is the BEST method to confirm that all firewall rules and router configuration settings are
adequate? - correct answer -Periodically perform penetration tests
Which of the following is MOST important for measuring the effectiveness of a security awareness
program? - correct answer -A quantitative evaluation to ensure user comprehension
Which of the following is the MOST important action to take when engaging third-party consultants to
conduct an attack and penetration test? - correct answer -Establish clear rules of engagement
Which of the following will BEST prevent an employee from using a USB drive to copy files from desktop
computers? - correct answer -Restrict the available drive allocation on all PCs
, Which of the following is the MOST important area of focus when examining potential security
compromise of a new wireless network? - correct answer -Number of administrators
Good information security procedures should: - correct answer -be updated frequently as new
software is released.
What is the MAIN drawback of e-mailing password-protected zip files across the Internet? They: -
correct answer -may be quarantined by mail filters.
A major trading partner with access to the internal network is unwilling or unable to remediate serious
information security exposures within its environment. Which of the following is the BEST
recommendation? - correct answer -Set up firewall rules restricting network traffic from that location
Documented standards/procedures for the use of cryptography across the enterprise should PRIMARILY:
- correct answer -define the circumstances where cryptography should be used.
Which of the following is the MOST immediate consequence of failing to tune a newly installed intrusion
detection system (IDS) with the threshold set to a low value? - correct answer -The number of false
positives increases
What is the MOST appropriate change management procedure for the handling of emergency program
changes? - correct answer -Documentation is completed with approval soon after the change
Who is ultimately responsible for ensuring that information is categorized and that protective measures
are taken? - correct answer -Security steering committee
The PRIMARY focus of the change control process is to ensure that changes are: - correct answer -
authorized.
An information security manager has been asked to develop a change control process. What is the FIRST
thing the information security manager should do? - correct answer -Meet with stakeholders