0% found this document useful (0 votes)
553 views

CCISO Practice Questions and Reasoning

The document contains 5 passages about risk management, information security standards, and compliance. Each passage presents multiple choice questions about concepts related to these topics. The correct answers demonstrate an understanding of common frameworks for measuring and managing risk, security, and compliance such as ISO 27001, ISO 27005, PCI DSS, NIST standards, and ITIL. High-level knowledge of these frameworks, standards, and related concepts is tested.

Uploaded by

Amit Raj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
553 views

CCISO Practice Questions and Reasoning

The document contains 5 passages about risk management, information security standards, and compliance. Each passage presents multiple choice questions about concepts related to these topics. The correct answers demonstrate an understanding of common frameworks for measuring and managing risk, security, and compliance such as ISO 27001, ISO 27005, PCI DSS, NIST standards, and ITIL. High-level knowledge of these frameworks, standards, and related concepts is tested.

Uploaded by

Amit Raj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 25

DOMAIN 1

1. An organization recently implemented a risk management program to measure the


risk of IT projects. Which of the following cases would this organization be MORE willing
to accept vs. mitigate risk?
A. The organization uses a quantitative process to measure risk.
Incorrect because it is a method to analyze risk in terms of asset
value
B. The organization uses a qualitative process to measure risk.
Incorrect because it is an assessment methodology that applies
estimates
C. The organization’s risk tolerance is high.
High tolerance means willing to continue with high risk conditions
D. The organization’s risk tolerance is low.
If an organization will not accept a high level of risk, it indicates a
low tolerance for it.
2. An organization is looking for a framework to measure the efficiency and
effectiveness of their Information Security Management System (ISMS). Which of the
following international standards can BEST assist this organization?
A. Payment Card Industry Data Security Standards (PCI-DSS).
PCI is not a complete ISMS, but a set of standards for protecting
credit card transactions
B. Control Objectives for Information Technology (COBIT).
This is a definition of Control Objectives for Information and Related
Technologies, focused on IT operations
C. International Organization for Standardizations (ISO) – 27004.
ISO/IEC 27004 provides guidelines intended to assist organizations
in evaluating the information security performance and the
effectiveness of an information security management system.
D. International Organization for Standardizations (ISO) – 27005.
ISO 27005 is the international standard that describes how to
conduct an information security risk assessments
3. A global healthcare company is concerned about protecting confidential information.
Which of the following is of MOST concern to this organization?
A. Compliance to Payment Card Industry (PCI) Data Security Standard.
PCI standards are applied to credit card transactions. A healthcare
company might have to deal with these transactions but it is not
focused on the core of their business
B. Compliance to privacy laws and regulations for each country where they
operate.
Healthcare organizations have stringent compliance laws regarding
the protection of patient data protections, such as HIPAA.
C. Conformance to local employment laws for each country where they operate.
While employment law compliance is important, it is not critical to the core
operation of the healthcare provider
D. Alignment to International Organization for Standardization (ISO).
This answer is too vague to consider as valid – which ISO?
4. A retail company is working on defining a compliance management process. Which of
the following are MOST likely to be included?
A. Payment Card Industry Data Security Standards (PCI-DSS).
PCI standards are applied to credit card transactions, and since we
are talking about a retail operation, this is the best choice.
B. Information Technology Infrastructure Library (ITIL).
This is generic to all types of companies, and not always applied. It
is a framework designed to standardize the selection, planning,
delivery, maintenance, and overall lifecycle of IT (information
technology) services.
C. International Organization for Standardization (ISO) standards.
ISOs are optional, plus the answer is very generic – which ISOs?
D. National Institute for Standards and Technology (NIST) standards.
Again, very generic. NIST develops and disseminates a wide range
of standards that allow technology to work seamlessly and
business to operate smoothly.
5. An organization is looking to implement a consistent Disaster Recovery and Business
Continuity Process across all its business units. Which of the following standards and
guidelines can BEST address this organization’s need?
A. International Organization for Standardizations – 27005 (ISO-27005).
This standard describes risk assessment methodology.
B. International Organization for Standardizations – 22301 (ISO-22301).
ISO 22301 is the International Standard for implementing and
maintaining effective business continuity plans, systems and
processes.
C. Information Technology Infrastructure Library (ITIL).
ITIL is a set of controls applied to IT services. It includes some
DR/BCP management guidance, but is not focused on it.
D. Payment Card Industry Data Security Standards (PCI-DSS).
PCI is focused on securing card transactions.
DOMAIN 2
1. The Information Technology Infrastructure Library Version 4 (ITIL® 4) Information
Security Management Practice is based on which standard? Choose the BEST answer.
A. International Organization for Standardization (ISO) 27799.
These are security guidelines taking into consideration the
organization's information security risk environment(s).
B. International Organization for Standardization (ISO) 27001.
ITIL is based on 27001, a framework that helps organizations
establish, implement, operate, monitor, review, maintain and
continually improve an ISMS
C. National Institute of Standards & Technology (NIST) Special Publication 800-
30.
Special Publication 800-30 is focused on risk assessments of
federal information systems and organizations
D. National Institute of Standards & Technology (NIST) Special Publication 800-
124.
800-124 provides guidelines for managing the security of mobile
devices in the enterprise.
2. Your information-security program is technically well provisioned; however, you
observe employee data and financial information exposed through compromised
account credentials. From the choices provided, what should you do FIRST to minimize
this threat?
A. Reset passwords for suspected compromised accounts.
This is the fastest method of immediately addressing compromised
credentials
B. Educate users about the threat of phishing.
This takes time while the compromise is active
C. Monitor the perimeter firewall for signs of phishing.
This is wrong because you are not directly addressing the active
threat condition, you are only monitoring the situation.
D. Contact a reputable security vendor to install an anti-phishing appliance.
Again, this is not an effective resolution to the current active threat.
3. An effective method for reducing the impact of credential theft is: Choose the BEST
answer.
A. Gaining the trust of your users so they will listen to you.
Having trust does not equate to applying effective security controls
B. Implementing employee monitoring so they don’t go to unauthorized sites.
You don’t know if visiting sites is the only credential leakage vector.
C. Deploying multi-factor authentication so accounts are better protected.
Multifactor authentication would add an effective layer of control for
remediating credential leakage and compromise
D. Resetting passwords every thirty days
This may seem correct, but we don’t know how often they are
currently set nor does simply resetting them correct a credential
protection issue.
4. Metrics capable of demonstrating that an organization is susceptible to, or has a high
probability of being susceptible to, a risk that exceeds the acceptable risk appetite are
KNOWN AS:
A. Key Performance Indicators (KPI).
KPI is too generic - can be applied in a wide range of metrics,
systems, processes, etc.

B. Key Risk Indicators (KRI).


KRIs provide the ‘fence’ if you will – they tell you when you have
exceeded certain risk conditions
C. Insurance Actuary Tables (IAT).
Incorrect because IATs are used by insurance companies to
determine the probability of certain events occurring
D. Risk Assumption Tables (RAT).
Incorrect because it is a repository, not a metric.
5. A primary consideration when selecting to transfer risk as a risk treatment option is?
Choose the BEST answer.
A. Capital cost.
Capital cost typically relates to the purchase of equipment
B. Selection of a security control vendor.
Just selecting a vendor does not transfer the risk.
C. Security consultant fees.
Fees do not address any risk condition
D. Insurance cost.
Transference of risk typically involves purchasing cyber insurance
DOMAIN 3

1. A CISO has a limited budget for security-technology purchases. The desire is to


create a tiered security architecture using a phased approach. Which of the following
represents the BEST approach for obtaining the security program’s objectives and
supporting the organization’s security needs?
A. Complete the easiest hardening actions first to demonstrate positive action
toward the security goal.
This is good for showing rapid positive program impact, but not so
much for managing risk with limited funds
B. Apply technology against the highest target value infrastructure while closely
monitoring spending.
This is correct for getting maximum benefit from limited funds –
attack the highest threat first
C. Install protections on Information Technology (IT) assets experiencing the
highest number of intrusive activities.
This did not say ‘successful’. High volume attack points do not
always equate to the highest risk
D. Determine the necessary security- program reporting metrics and apply
protections according to monthly report results.
This answer does not include the funding factor, which is what we
are trying to solve
2. For a CISO to have true consolidated situational awareness, there is a need to
deploy technology that can give a real-time view of security events across the
enterprise. Which of the following tools represents the BEST choice to achieve this
awareness?
A. Vulnerability scanning system.
Scanning finds vulnerabilities but does not provide real-time
situational awareness
B. Intrusion Detection System (IDS).
An IDS might be applied to high risk system and collect attack
information, but not necessarily consolidate attack data across a
wide range of systems and environments
C. Firewalls.
Firewalls use rules to analyze, block, and report, but are not
consolidation points for other security tech
D. Security Incident Event Management (SIEM).
SIEM consolidates real-time data from a wide range of systems and
environments, providing the ‘single pane’ view of security in the
enterprise
3. What is the MAIN responsibility of a Purple Security Testing team?
A. They defend against simulated hacker attacks.
Defenders are typically called Blue Team
B. They emulate hackers to compromise systems.
This is done by the Red Team
C. The integrate the defensive tactics and controls from the Blue Team with the
threats and vulnerabilities found by the Red Team.
There is the logic that blue mixed with red makes purple, and using
inputs from the red and blue teams is correct answer.
D. They oversee security testing and results.
Testing and results can be managed by a wide range of individuals,
and is not the main responsibility of a Purple team
4. Your company leverages an employee self-service portal for common human-
resourcerelated tasks such as providing annual tax documents, changing direct-deposit
information, and signing up for health benefits. Several employees have complained
that they have not received their paychecks this month; everyone else received their
paychecks as usual. What is the MOST likely cause?
A. Their respective financial institutions were compromised right before payroll
was deposited and their accounts were emptied.
The impact was somewhat spotty – why a few but not all? A pattern
would emerge if a single bank was involved, which was not stated.
B. An accounting “glitch” skipped their pay accounts during the payroll audit and
failed to issue them a check.
If it was a glitch in the payment system there would be more
widespread impact.
C. They failed to submit their timecards by the deadline.
This is typically flagged before a payday, and would be discovered
through system reporting, making it not likely
D. Their company credentials were stolen and used to modify bank routing and
account information.
This would most likely, as a small number were impacted there was
no other correlating cause/effect.
5. Controlled phishing campaigns against your own employees:
A. Help you identify areas where you have the potential to improve your training
efforts to increase employee resilience against attacks.
Phishing campaigns result provide direct feedback on the
effectiveness of your employee training program
B. Target employees that are not following company policy and therefore must be
let go.
Phishing campaigns are not designed, by nature, to cull employees
from an organization
C. Reduces the amount of time that employees read real fraudulent email and
therefore prevents the opportunity to be compromised.
Phishing campaigns work to improve fraudulent email recognition,
not eliminate the reading of it
D. Should not be conducted because it desensitizes them to real-world threats,
hindering their ability to detect phishing attempts.
This is simply untrue – it improves their ability to recognize real-
world phishing attempts
DOMAIN 4
1. Advanced Persistent Threat (APT) is BEST characterized by which of the following?
A. High volumes of unauthorized insider activities such as copying data onto
portable storage devices or electronic destruction of high value assets.
This is typical ‘noisy’ insider threat activity
B. Creative insertions of malicious code into applications and databases using
known code vulnerabilities and weaknesses.
This is typical of cybercriminals as they gain entry into systems and
can be pretty ‘noisy’
C. Continuous flooding of network perimeters with system requests causing long-
term delays and interruptions.
This is VERY noisy - DDoS activity – that is easily spotted and
(hopefully) rectified
D. Methodical advancement of unauthorized access across systems as valuable
assets are discovered using a variety of penetration techniques.
This is indicative of APT – quiet, stealthy advancement through
infrastructure and systems
2. A vulnerability assessment discovers that it is possible for an attacker to force an
authorization step to take place before the authentication step is completed
successfully. What type of issue would ALLOW for this type of compromise to take
place ?
A. Maintenance hook.
This is a trap door in code that allows unauthorized access to
software
B. Backdoor.
This is the provisioning of methods to subvert security controls
C. Race condition.
A race condition introduces errors in which processes and steps
can be completed out of sequence, causing security issues
D. Data validation error.
This is a data input issue, not a serial step violation issue
3. A cloud computing environment that is bound together by technology that allows data
and applications to be shared between public and private clouds is BEST referred to as
a?
A. Hybrid cloud.
A hybrid could consists of both public and private clouds
B. Public cloud.
This is only available publicly, not privately
C. Community cloud.
This is a private cloud restricted to a community of users
D. Private cloud.
This is not available to the public
4. Which of the following physical security measures is LEAST effective at mitigating the
tailgating?
A. Mantrap.
Mantraps are an extremely effective control
B. Biometric scanner.
Biometrics applied to entry systems is highly effective
C. User awareness training (UAT).
User training does not provide a physical control as found in the
other answers
D. Turnstile
A turnstile might not be the most effective measure, but it does
provide a barrier and is relatively effective
5. If a Virtual Machine's (VM) data is being replicated and that data is corrupted, this
corruption will automatically be replicated to the other machine(s). What would be the
BEST control to safeguard data integrity?
A. Backup to tape.
This propagates the issue and does not resolve the core issue
B. Backup to a remote location.
Using a remote location does not solve the core issue
C. Maintain separate VM backups.
This provides separation between environments, halting the
propagation issue
D. Increase VM replication frequency.
Replicating frequently actually makes the situation worse!
DOMAIN 5
1. A CISO is considering a major security technology purchase and needs to
understand product capabilities, corporate history, customer feedback, and cost and
implementation effort. What is the BEST way to collect this type of initial information?
A. Use a Request for Proposal (RFP) approach for gathering information.
An RFP will provide you the information about the company and
product
B. Create a business case in order to communicate expected budget support
requirements.
The business case does not contain vendor or product details
C. Create a Return on Investment (ROI) document for executive peer budget
analysis and reviews
The ROI does not include product and vendor details, it is focused
on determining true value of the product or services.
D. Establish a competitive product review of a few selected technologies in a lab
environment.
This is used to compare competing technologies (‘bake-off’)
2. As CISO for a large corporation, you’ve outsourced your network security operations
center to a service provider. Which of the following are the two MOST important Key
Performance Indicators (KPIs) you would include in your Service-Level Agreement
(SLA)?
A. Incident response times and number of malicious events.
The number of malicious events will probably include a LOT of low
priority stuff, which is not a great metric to use
B. Incident reporting times and number of unmitigated network attacks.
Reporting is never as good as responding to an attack
C. Incident response times and number of unmitigated network attacks.
Response times and unmitigated attacks are crucial metrics for
determining the state of the security program and its needs
D. Incident reporting times and number of malicious events.
Again – reporting is NEVER as critical as responding
3. What is the MOST important thing to consider when writing the Statement of Work
(SOW)?
A. The Service-Level Agreements (SLA).
SLAs are critical because they ensure performance contract
performance quality
B. Appropriate allocation of dedicated resources.
Important, but not as much so as the SLA
C. Reduction of the number of malicious attacks during the contract period.
Not all contracts are focused on reducing attacks.
D. Ensure payment terms are at least NET 30.
Payment terms are less important the delivery quality
4. A CISO is required to create an annual security capital expense (CapEx) budget.
Which of the following would be INCLUDED in that part of her budget?
A. Fractional costs of employees from other business units who are required to
periodically perform security duties.
These are operational expenses,
B. Security equipment purchases which are amortized over a longer period than
the calendar budget year.
Capital expenditures are typically hardware related, and can be
amortized (gradually written off as an expense) as they are used
C. Supporting business unit costs, such as legal advisement and auditing support
for the program.
These are operational expenses
D. All labor expenses realized by employees directly assigned to the security
organization.
Labor is always an operational expense
5. A CISO observed that the organization’s web filtering solution has been superseded
by more advanced versions and should be replaced. Which of the following BEST
describes this analysis?
A. Technology obsolescence.
This best describes the situation – old tech is no longer supported
or capable of delivering to the needs of the org and has to be
replaced
B. Capital expense planning.
This is budgeting, nothing to do with poor tech performance
C. Return on investment.
This is used to determine the value of purchasing something or
evaluating something purchased
D. Cost-benefit analysis.
A CBA is a financial analysis of the value of a purchase

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy