Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
International Council of E-Commerce Consultants (EC-Council)
Exam 2: Certified Network Defender
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 321
Multiple Choice
How often should the Statements of Standards for Attestation Engagements-16 (SSAE16) /International Standard on Assurance Engagements 3402 (ISAE3402) report of your vendors be reviewed?
Question 322
Multiple Choice
Your incident response plan should include which of the following?
Question 323
Multiple Choice
The security team has investigated the theft/loss of several unencrypted laptop computers containing sensitive corporate information. To prevent the loss of any additional corporate data, it is unilaterally decided by the CISO that all existing and future laptop computers will be encrypted. The help desk is then flooded with complaints about the slow performance of the laptops and users are upset. Which of the following best describes what the CISO did wrong?
Question 324
Multiple Choice
Scenario: Your organization employs single sign-on (user name and password only) as a convenience to your employees to access organizational systems and data. Permission to individual systems and databases is vetted and approved through supervisors and data owners to ensure that only approved personnel can use particular applications or retrieve information. All employees have access to their own human resource information, including the ability to change their bank routing and account information and other personal details through the Employee Self-Service application. All employees have access to the organizational VPN. Recently, members of your organization have been targeted through a number of sophisticated phishing attempts, resulting in compromised credentials. What action can you take to prevent external misuse of compromised credentials while still allowing employees to manage their bank information?
Question 325
Multiple Choice
When dealing with risk, the information security practitioner may choose to:
Question 326
Multiple Choice
Which of the following methodologies references the recommended industry standard that all project managers should follow?
Question 327
Multiple Choice
Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations. You have decided to deal with risk to information from people first. How can you minimize risk to your most sensitive information before granting access?
Question 328
Multiple Choice
Scenario: A CISO has several two-factor authentication systems under review and selects the one that is most sufficient and least costly. The implementation project planning is completed and the teams are ready to implement the solution. The CISO then discovers that the product it is not as scalable as originally thought and will not fit the organization's needs. The CISO discovers the scalability issue will only impact a small number of network segments. What is the next logical step to ensure the proper application of risk management methodology within the two-factor implementation project?
Question 329
Multiple Choice
The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?
Question 330
Multiple Choice
The process for management approval of the security certification process which states the risks and mitigation of such risks of a given IT system is called___________________.
Question 331
Multiple Choice
Your organization provides open guest wireless access with no captive portals. What can you do to assist with law enforcement investigations if one of your guests is suspected of committing an illegal act using your network?