1. The Security policy is designed to address the following
A. Organizational structure
B. Organizational Business objectives
C. The specifics of the Industry that organization belongs
D. All of the above
E. None of the above
2. List the 4 layers recognized by NIST SP 800-16
__________________
___________________
___________________
___________________
3. Following element is not included in Organization security policy
A. Business Ethics
B. Business Continuity
C. Violations Reporting
D. Authentication
4. Following standard has good information on setting up IT security policies
A. ISO 17799
B. COBIT
C. ISACA
D. All of the above
E. None of the above
5. Following standard talks about the employee specific security
A. ISO 17799
B. COBIT
C. ISACA
D. All of the above
E. None of the above
6. An employee was fired after it was revealed in personal email he sent through company mail that he faked sickness few times. Is the firing justified
A. No, because reading his personal emails is violation of his privacy rights
B. Yes, because the privacy is protected when using company resources.
7. List any 4 elements of Security Audit and Alarms model
__________________
___________________
___________________
___________________
8. Application level vulnerabilities are found in the following
A. Syslog
B. Windows System log
C. Windows Application Log
D. Security Log
E. All of the above
9. Fill in the Blanks
ISO Stands for _____________
Purpose of ISO __________________
10. Following is the best data analysis approach to define abnormal events
A. Basic Alerting
B. Baselining
C. Anomaly Detection
D. Correlation
E. All of the above
11. Following analysis approach relies on relating one event to another
A. Basic Alerting
B. Baselining
C. Anomaly Detection
D. Correlation
E. All of the above
12. In the case study, why did the security officer choose MARS system
__________________________
13. Certification most suited for jobs in government organizations
A. CGEIT
B. CISA
C. CSSLP
D. CISSP
E. All of the above
14. Following certification focuses on software development
A. CGEIT
B. CISA
C. CSSLP
D. CISSP
E. All of the above
15. Given an opportunity, which certification would you go for?
________________