Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
International Council of E-Commerce Consultants (EC-Council)
Exam 2: Certified Network Defender
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 301
Multiple Choice
What role should the CISO play in properly scoping a PCI environment?
Question 302
Multiple Choice
What is the main purpose of the Incident Response Team?
Question 303
Multiple Choice
The implementation of anti-malware and anti-phishing controls on centralized email servers is an example of what type of security control?
Question 304
Multiple Choice
The Information Security Management program MUST protect:
Question 305
Multiple Choice
Which of the following are the MOST important factors for proactively determining system vulnerabilities?
Question 306
Multiple Choice
A new CISO just started with a company and on the CISO's desk is the last complete Information Security Management audit report. The audit report is over two years old. After reading it, what should be your first priority?
Question 307
Multiple Choice
What should an organization do to ensure that they have a sound Business Continuity (BC) Plan?
Question 308
Multiple Choice
Which of the following tests is performed by an Information Systems (IS) auditor when a sample of programs is selected to determine if the source and object versions are the same?
Question 309
Multiple Choice
A global health insurance company is concerned about protecting confidential information. Which of the following is of MOST concern to this organization?
Question 310
Multiple Choice
An IT auditor has recently discovered that because of a shortage of skilled operations personnel, the security administrator has agreed to work one late night shift a week as the senior computer operator. The most appropriate course of action for the IT auditor is to:
Question 311
Multiple Choice
What is the BEST way to achieve on-going compliance monitoring in an organization?
Question 312
Multiple Choice
Which of the following represents the MOST negative impact resulting from an ineffective security governance program?
Question 313
Multiple Choice
A person in your security team calls you at night and informs you that one of your web applications is potentially under attack from a cross-site scripting vulnerability. What do you do?
Question 314
Multiple Choice
Providing oversight of a comprehensive information security program for the entire organization is the primary responsibility of which group under the InfoSec governance framework?
Question 315
Multiple Choice
You work as a project manager for TYU project. You are planning for risk mitigation. You need to quickly identify high-level risks that will need a more in-depth analysis. Which one of the following approaches would you use?