What type of attack could directly affect the confidentiality of an unencrypted VoIP network?
Which of the following testing methodologies TYPICALLY involves code analysis in an offline environment without ever actually executing the code?
In a virtualised cloud environment, what component is responsible for the secure separation between guest machines?
Which of the following is NOT a valid statement to include in an organisation's security policy?
What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
When establishing objectives for physical security environments, which of the following functional controls SHOULD occur first?
Geoff wants to ensure the application of consistent security settings to devices used throughout his organisation whether as part of a mobile computing or a BYOD approach.
What technology would be MOST beneficial to his organisation?
Which of the following cloud delivery models is NOT intrinsically "trusted" in terms of security by clients using the service?
In order to better improve the security culture within an organisation with a top down approach, which of the following actions at board level is the MOST effective?
Why might the reporting of security incidents that involve personal data differ from other types of security incident?
Which security framework impacts on organisations that accept credit cards, process credit card transactions, store relevant data or transmit credit card data?
Which of the following is often the final stage in the information management lifecycle?
When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
1 Third party is competent to process the data securely.
2. Observes the same high standards as data owner.
3. Processes the data wherever the data can be transferred.
4. Archive the data for long term third party's own usage.
What advantage does the delivery of online security training material have over the distribution of printed media?
What form of attack against an employee has the MOST impact on their compliance with the organisation's "code of conduct"?
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
Ensuring the correctness of data inputted to a system is an example of which facet of information security?
What aspect of an employee's contract of employment Is designed to prevent the unauthorised release of confidential data to third parties even after an employee has left their employment?
What type of attack attempts to exploit the trust relationship between a user client based browser and server based websites forcing the submission of an authenticated request to a third party site?
Which term describes the acknowledgement and acceptance of ownership of actions, decisions, policies and deliverables?