Question 21

How might the effectiveness of a security awareness program be effectively measured?
1) Employees are required to take an online multiple choice exam on security principles.
2) Employees are tested with social engineering techniques by an approved penetration tester.
3) Employees practice ethical hacking techniques on organisation systems.
4) No security vulnerabilities are reported during an audit.
5) Open source intelligence gathering is undertaken on staff social media profiles.
  • Question 22

    What is the name of the method used to illicitly target a senior person in an organisation so as to try to coerce them Into taking an unwanted action such as a misdirected high-value payment?
  • Question 23

    When considering outsourcing the processing of data, which two legal "duty of care" considerations SHOULD the original data owner make?
    1 Third party is competent to process the data securely.
    2. Observes the same high standards as data owner.
    3. Processes the data wherever the data can be transferred.
    4. Archive the data for long term third party's own usage.
  • Question 24

    When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always be taken into consideration?
  • Question 25

    Which standard deals with the implementation of business continuity?