What type of attack could directly affect the confidentiality of an unencrypted VoIP network?
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
What form of attack against an employee has the MOST impact on their compliance with the organisation's "code of conduct"?
You are undertaking a qualitative risk assessment of a likely security threat to an information system.
What is the MAIN issue with this type of risk assessment?
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
Which algorithm is a current specification for the encryption of electronic data established by NIST?
Which of the following is often the final stage in the information management lifecycle?
Which term is used to describe the set of processes that analyses code to ensure defined coding practices are being followed?
Which of the following uses are NOT usual ways that attackers have of leveraging botnets?
What Is the first yet MOST simple and important action to take when setting up a new web server?
Why is it prudent for Third Parties to be contracted to meet specific security standards?
Once data has been created In a standard information lifecycle, what step TYPICALLY happens next?
What Is the KEY purpose of appending security classification labels to information?
What advantage does the delivery of online security training material have over the distribution of printed media?
A penetration tester undertaking a port scan of a client's network, discovers a host which responds to requests on TCP ports 22, 80, 443, 3306 and 8080.
What type of device has MOST LIKELY been discovered?
Which of the following is NOT a valid statement to include in an organisation's security policy?
What aspect of an employee's contract of employment Is designed to prevent the unauthorised release of confidential data to third parties even after an employee has left their employment?
What type of diagram used in application threat modeling includes malicious users as well as descriptions like mitigates and threatens?
Which membership based organisation produces international standards, which cover good practice for information assurance?