Module 5 Q and A
Module 5 Q and A
Which of the following shall BEST help in deciding upon the protection
level for information asset?
A. Location of asset.
B. Impact of risk.
C. Vulnerabilities in asset.
D. Inventory of threats
2. Which of the following is a risk response option?
A. Determine likelihood of threat
B. Determine probability of risk
C. Deciding amount of insurance cover
D. Prepare risk profile report
3. After a Tsunami, a business decides to shift the location of data centre
from coastal area to mid land. Which type of risk response option it has
exercised?
A. Accept
B. Avoid
C. Mitigate
D. Transfer
Introduction to Protection of Information
Assets
9. The quantum of risk after enterprise has implemented controls based on risk
mitigation plan is:
A. Accepted risk
B. Residual risk
C. Inherent risk
D. Current risk
10. Which of the following shall best help in aligning IT risk with
enterprise risk?
A. Presenting IT risk results in business terms.
B. Conducting business impact analysis.
C. Making Chief risk officer accountable.
D. Align IT strategy with business strategy.
2.1
1. The Primary objective of implementing Information security management is to:
A. Ensure reasonable security practices
B. Comply with internal audit requirements
C. Adopt globally recognized standards
D. Protect information assets
2. Which of the following is primary function of information security policies?
A. Align information security practices with strategy
B. Communicate intent of management to stakeholders
C. Perform risk assessment of IT operations and assets
D. Ensure compliance with requirements of standards
3. Information security policies are set of various policies addressing
different information systems areas based on the IT infrastructure of
organization. Which of the following policy is most common in all
organizations?
A. Acceptable use policy
10. Which of the following is main reason for not allowing mobile devices into data
center?
A. Unauthorized changes and access in configuration
B. Prevent photography of data center layout
C. User can provide information to attacker on phone
D. Mobile devices generate wireless communication
9. Which of the following attack to break the user password is difficult to control?
A. Brute Force
B. Dictionary attack
C. Spoofing
D. Social engineering
10. Which of the following is a primary objective of implementing logical
access controls?
A. Identify users on the system
B. Fixing accountability of actions
C. Authorize users based on role
D. Compliance with policy
Logical Access Controls
5.1
1. Which of the following is a method used to gather information
about the communication network?
A. Reconnaissance
B. Brute force
C. Eavesdropping
D. Wiretapping
2. Message digest helps organization in getting assurance on:
A. Communication delivery
B. Data availability
C. Data integrity
D. Data confidentiality
3. While auditing organization’s network which of the following control
IS auditor must verify first?
A. Encrypted communication
Network Security Controls
B. Network zoning
C. Firewall configuration
D. Penetration test report
4. Cryptographic checksum is a network control that:
A. Adds a parity bit after adding the data bits.
B. Translates data in a file into a hash value.
C. Transmits the data after encryption.
D. Translates the data into a parity checksum combination.
5. Primary function of Security operations center (SOC) is to:
A. Define baseline
B. Configure firewall
C. Monitor logs
D. Implement Antivirus
6. The intrusion detection monitoring on a host for data integrity attack by
malicious software is a:
A. Technical control
B. Corrective control
C. Detective Control
D. Preventive Control
7. Which of the following is most important while performing penetration
testing?
A. Maintain secrecy about testing
B. Get consent from affected stakeholders
C. Report to be provided to all users
D. Perform test after office hours
8. Most web based application attacks can be prevented by:
A. Input validation
B. Encryption
C. Penetration test
D. Access controls
Background Material on Information Systems Audit 3.0 Course (Module 5)