Lately, the support desk is receiving several requests for password resets from individuals who appear to be unknown to the organization. Possible criminal activities are suspected, and the organization wishes to address this issue in their information security awareness program. What is the area that requires awareness?
Controls to manage risk have been implemented and evaluated successfully. Risks are now at the level which the organization is willing to accept. What is the name of this risk?
Before signing the contract with the proposed vendor, concerns have been raised over future price increases. The internal business units, however, insist that the agreement with the vendor must take place as a result of the vendor evaluation process. What is the likely action to take?
The team responsible for network security has proposed a firewall as the preferred control for the network perimeter. How is this type of control categorized?
A technical team investigating possible controls concludes that the most preferred control cannot be implemented as a result of too many constraints and decides to propose the second-best control. How is this control being referred to?
During Post Implementation Review (PIR) of changes, it is lately concluded that an unusual high number of changes failed to meet their objectives. What is the most likely cause of this?
A new system (application) is developed for the marketing department. Stakeholders have demanded an independent white box test to take place. What are the stakeholders’ biggest concern?
The introduction of a security awareness program has resulted in a quick decrease in security incidents. Eight months later, security incidents are showing a sudden increase, and the blame is put on a non-functioning security awareness program. What is most likely the cause?
Users (customers) are complaining about the quality of how problems are being solved. What is the most likely cause?
The IT department is requested to select and implement technology and support which will deliver knowledge capable of supporting cross-functional business units. What do you require?