Your organisation processes a lot of personally identifiable information (PII) as part of their day-to-day function. There is a significant data breach that compromises several company databases. What is the most likely form of impact to the business?
Financial
Regulatory
Motivational
Operational
Which network device is used to direct traffic to individual endpoints in a LAN using MAC addresses?
Hub
Switch
Router
Bridge
What is the most important thing to consider when determining if an information asset should be protected?
Effort needed to provide security
Cost of protection
Legal compliance
If you have been attacked before
Which of the following presents a risk relating to analysing future trends?
Can lead to a false sense of security if the trends are misinterpreted
Decreased staff motivation due to changing policies
Adds additional work to the cyber team who are already too busy
Doesn’t provide enough benefits given the time involved in undertaking the task
Which category of defence does CCTV fall under?
Physical preventative
Physical deterrent
Physical administrative
Physical directive
What is the best definition of an information asset?
Any data or device that supports business processes or operations
A technical subject matter expert
An organisation's central database server
All hardware and software owned by an organisation
What is the primary reason for obtaining Cyber Essentials certification?
Reduce cyber threat
To put a logo on the company website
To give staff confidence in the company’s organisation skills
Ensuring the system is 100% secure
Which source of threat is the most common problem for SME businesses?
Insiders
Nation state
Criminal groups
Script kiddies
What is the main security concern regarding storage of personal data in multiple locations across the globe?
The staff in the locations may not fully understand the data being stored as it is in a different language
It may be difficult to maintain access to data distributed across the world
Data held in other countries may be at greater risk of breach
There may be legal ramifications and issues resulting from data protection legislation in the country of origin
What is the main concern resulting from poor software maintenance practices?
Increased maintenance costs
Subsequent poor performance of the product
User experience declines
Resultant exposure to vulnerabilities
Security requirements for a new product or system are GENERALLY driven by which of the following?
Security solutions.
Security objectives.
Security functions.
Security guidelines
Outsourcing equipment maintenance falls under which category of risk treatment?
Accept
Avoid
Reduce
Transfer
Which of the following is the best description of extrinsic assurance?
Confidence in the process used by the supplier during development by following a recognised standard
Designing and implementing to a recognised standard
Independent verification using external evaluation
Operating and maintaining to a recognised standard
In penetration testing, which team would be responsible for defending the system?
Red Team
Blue Team
Purple Team
White Team
What is the primary limitation of security testing as an extrinsic assurance method?
Systems are tested against known vulnerabilities only
It follows an outdated standard
Tests cannot be automated
It provides paper-based testing and does not flag real-world issues
Which of the following standards would be most suitable to refer to when attempting to improve information security in a business?
ISO 22301
PCI-DSS
ISO 27001
ISATAP
When migrating from an on-premises solution to a cloud solution, what should you ensure is provided to ensure users are always able to access the data?
Security groups
Availability zones
Elasticity
Offline Backups
Which model allows relative prioritisation of security objectives?
SMART
ISO 22301
IASME Governance
MoSCoW
In cyber assurance, which of the following actions would result in a system being considered “trusted”?
PKI digital certificates are used to provide proof of origin
The software developer follows the trustworthy software framework in developing the application
A well-known company produces a website using secure coding techniques
The system has bene developed to comply with ISO27001 requirements
What is the best description of a XSS attack?
A threat actor inserts data, such as a malicious script, into content from trusted websites which is then included with dynamic content delivered to a victim's browser
A type of website exploit carried out by issuing unauthorized commands from a trusted website user, exploiting the websites trust for the user’s browser
A threat actor exploits weak web-based protocols to insert themselves between entities in a communication channel to steal data
An attempt to issue commands to a database via a website interface
Which of the following is true regarding thin clients
They perform most of the processing on the client
They have higher hardware specifications than standard user devices
They provide more streamlined operating systems than thick clients, requiring less processing power
Most of the processing occurs on the server
Which type of malware is uses an action or other function as a trigger to begin the attack?
Worm
Trojan
Logic bomb
Ransomware
A member of the IT department is fired. Before leaving, the staff member changes the administrator password and doesn’t tell anyone. What type of insider threat does this represent?
Negligent insider
Malicious insider
Inadequately trained employee
Unmanaged 3rd party staff
Which of the following factors independently contributes the most to creating a positive security culture?
Regular training and awareness sessions
Lack of procedures for whistleblowing
A robust disciplinary policy
Departmental managers monitoring staff actions
What are the primary components of a threat?
Attack technique, motive and opportunity
Attack technique, motivation and money
Motivation, opportunity and objective
Technical ability, determination and finances
Which of the following is true regarding environmental hazards such as fire and flood?
They cause less damage than an external attack
These hazards can result in the same impact as an attack
They are only the result of negligence
These are considered less important that external attacks
What is meant by “defending assets and related systems is asymmetric”?
Organisations spend less money on providing security than attackers spend on breaching it
Every risk needs treating but attackers only need to exploit one
It requires more technical knowledge to defend systems than to attack them
There are more people trying to breach security systems than there are trying to protect them
Which of the following does NOT provide a detective control?
Inventory checks
IDS
SIEM
Patching
Which of the following is NOT a benefit of using the MITRE Att&ck Model?
It provides a path for assessing the value of information, the definition of targets and prioritising actions
It can be used to build behavioural analytics for detecting the behaviour of the adversary
It removes the need for a fully independent cyber security department
It can be used to assess monitoring and mitigation tools for defences already deployed within an enterprise
Which set of regulations specifies the requirements for securing data in payment card systems?
Cyber Essentials
ISO 27001
NIST Cybersecurity Framework
PCI-DSS
Which of the following would NOT be considered a breach of criminal law?
Accessing a company database which you are not authorised to access
Selling customer details to a competitor
Failing to meet designated SLA’s when supporting external customers
Failing to provide appropriate security for staff data
Which GDPR principle dictates that organisations must protect personal data?
Lawfulness, fairness and transparency
Data minimisation
Accountability
Security and integrity principle
Which of the following is a US copyright law that criminalises the production and dissemination of technologies, devices or services intended to circumvent access control measures on copyrighted works?
EU-US Privacy Shield
Digital Millennium Act
Patriot Act
ITAR
Which of the following are NOT likely to mandatory actions for all staff to assist in maintaining organisational security?
Comply with the acceptable use policy
Obtain basic cyber security certification
Participate in training and awareness measures
Follow the company security procedures
Membership of a cyber security professional body such as ISACA requires you to adhere to what?
Prescribed cryptographic tools for emails exchange
Choice of cyber security tools
Code of professional ethics
Approved suppliers of managed services
What is the primary security concern relating to increased usage of IoT devices?
Increased monitoring requirements
Compatibility across multiple vendors
Compatibility with existing security provisions
Increased attack surface
Which term refers to providing proof of origin, authenticity, and integrity of data?
Confidentiality
Integrity
Authentication
Non-repudiation
In Cyber Security, what is the relationship between risk, threat and vulnerability?
Vulnerability is the destruction or damage to an asset after a risk calculation has been taken to mitigate against such a threat
Threat is the potential for loss, damage or destruction of an asset as a result of a vulnerability exploiting a risk
Risk is the potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability
Risk is the potential for loss, damage or destruction of an asset as a result of a vulnerability exploiting a threat
What is the Delphi method?
An executive coaching method using a four-step framework to help individuals and groups to solve problems
Four-step problem-solving iterative technique used to improve business processes
A forecasting process based on the results of multiple rounds of questionnaires sent to a panel of experts
A continuous development process ensuring development of the security posture of enterprise organisations