1.
Which of the following would be the first step in establishing an information security program?
A. 
Adoption of a corporate information security policy statement
B. 
Development and implementation of an information security standards manual
C. 
Development of a security awareness-training program
D. 
Purchase of security access control software
2.
When developing an information security policy, what is the FIRST step that should be taken?
A. 
Obtain copies of mandatory regulations.
B. 
Gain management approval.
C. 
Seek acceptance from other departments.
D. 
Ensure policy is compliant with current working practices.
3.
Which one of the following should NOT be contained within a computer policy?
A. 
Definition of management expectations.
B. 
Responsibilities of individuals and groups for protected information.
C. 
Statement of senior executive support.
D. 
Definition of legal and regulatory controls.
4.
Which must bear the primary responsibility for determining the level of protection needed for information systems resources?
A. 
B. 
C. 
Seniors security analysts
D. 
5.
A biometric fingerprint scanner is an example of which of the following?
A. 
Two-factor authentication
B. 
C. 
Three-factor authentication
D. 
Single-factor authentication
6.
Which of the following would an IS auditor consider to be the most helpful when evaluating the effectiveness and adequacy of a computer preventive maintenance program?
A. 
Vendors reliability figures
B. 
Regularly scheduled maintenance log
C. 
D. 
A written preventive maintenance schedule
.
7.
Which of the following procedures would most effectively detect the loading of illegal softwarepackages?
A. 
Policies that result in instant dismissal if violated
B. 
The use of diskless workstations
C. 
The use of current antivirus software
D. 
Periodic checking of hard drives
8.
The internal audit department of an organization has developed and maintained ACL scripts for continuous auditing purposes. These scripts were provided to IT management for continuous monitoring purposes. This situation resulted in a potential conflict related to the auditor's independence and objectivity. Which of the following actions would best resolve the issue?
A. 
The internal audit team should stop sharing the scripts so that IT management must
develop its own scripts.
B. 
Since continuous monitoring and continuous auditing are similar functions, IT management
should assign the continuous monitoring tasks the internal audit department.
C. 
IT management should continue to use the scripts for continuous monitoring
purposes with the understanding that it is responsible for testing and maintaining the
scripts that it uses.
D. 
The internal audit team should review the areas where these scripts are being used and
reduce the audit scope and frequency for these areas.
9.
An IS auditor evaluating the resilience of a high-availability network should be most concernedif:
A. 
The network servers are clustered in a site
B. 
The setup is geographically dispersed
C. 
The use of current antivirus software
D. 
Policies that result in instant dismissal if violated
10.
Information for detecting unauthorized input from a terminal would be best provided by the:
A. 
B. 
Automated suspense file listing
C. 
D. 
11.
Which of the following could result from inadequate software baselining?
A. 
B. 
C. 
Software integrity violations
D. 
12.
While reviewing sensitive electronic work papers, the IS auditor noticed that they were not encrypted. This could compromise the:
A. 
Audit trail of the versioning of the work papers
B. 
Approval of the audit phases
C. 
Access rights to the work papers
D. 
Confidentiality of the work papers
13.
The MOST important reason for an IS auditor to obtain sufficient and appropriate audit evidence is to:
A. 
Comply with regulatory requirements
B. 
Provide a basis for drawing reasonable conclusions
C. 
Ensure complete audit coverage
D. 
Perform the audit according to the defined scope
14.
What function does the auditor provide?
A. 
Second set of eyes, which are external from the subject under review
B. 
Independent assurance that the claims of management are correct
C. 
Assistance by fixing problems found during the audit
D. 
Adapting standards to fit the needs of the client
15.
Which one of the following is an important characteristic of an information security policy?
A. 
Identifies major functional areas of information.
B. 
Quantifies the effect of the loss of the information.
C. 
Requires the identification of information owners.
D. 
Lists applications that support the business function.
16.
In which one of the following documents is the assignment of individual roles and responsibilities MOST appropriately defined?
A. 
B. 
C. 
D. 
17.
Which one of the following is NOT a fundamental component of a Regulatory Security Policy?
A. 
B. 
C. 
D. 
18.
Network Security is a process that is:
A. 
B. 
C. 
D. 
19.
A high profile company has been receiving a high volume of attacks on their web site. The network administrator wants to be able to collect information on the attacker(s) so legal action can be taken. What should be implemented?
A. 
B. 
C. 
D. 
20.
You are running cabling for a network through a boiler room where the furnace and some other heavy machinery reside. You are concerned about interference from these sources. Which of the following types of cabling provides the best protection from interference in this area?
A. 
B. 
C. 
D. 
21.
In order for a user to obtain a certificate from a trusted CA (Certificate Authority), the user must present proof of identity and a?
A. 
B. 
C. 
D. 
22.
While performing a routing site audit of your wireless network, you discover an unauthorized Access Point placed on your network under the desk of Accounting department security. When questioned, she denies any knowledge of it, but informs you that her new boyfriend has been to visit her several times, including taking her to lunch one time. What type of attack have you just become a victim of?
A. 
B. 
C. 
D. 
23.
While connected from home to an ISP (Internet Service Provider), a network administrator performs a port scan against a corporate server and encounters four open TCP (Transmission Control Protocol) ports: 25, 110, 143 and 389. Corporate users in the organization must be able to connect from home, send and receive messages on the Internet, read e-mail by beams of the IMAPv.4 (Internet Message Access Protocol version 4) protocol, and search into a directory services database for user e-mail addresses, and digital certificates. All the e-mail relates services, as well as the directory server, run on the scanned server. Which of the above ports can be filtered out to decrease unnecessary exposure without affecting functionality?
A. 
B. 
C. 
D. 
24.
A piece of malicious code that can replicate itself, has no productive purpose, and exists only to damage computer systems or create further vulnerabilities is called a?
A. 
B. 
C. 
D. 
25.
A user ID, PIN, and a palm scan are all required to authenticate a system. Which of the following is this an example of?
A. 
B. 
Two-factor authentication
C. 
Single-factor authentication
D. 
Three-factor authentication