- (Exam Topic 15)
The Chief Executive Officer (CEO) wants to implement an internal audit of the company's information security posture. The CEO wants to avoid any bias in the audit process; therefore, has assigned the Sales Director to conduct the audit. After significant interaction over a period of weeks the audit concludes that the company's policies and procedures are sufficient, robust and well established. The CEO then moves on to engage an external penetration testing company in order to showcase the organization's robust information security stance. This exercise reveals significant failings in several critical security controls and shows that the incident response processes remain undocumented. What is the MOST likely reason for this disparity in the results of the audit and the external penetration test?
Correct Answer:
C
- (Exam Topic 13)
During examination of Internet history records, the following string occurs within a Unique Resource Locator (URL): http://www.companysite.com/products/products.asp?productid=123 or 1=1
What type of attack does this indicate?
Correct Answer:
C
- (Exam Topic 15)
Which of the following is a canon of the (ISC)2 Code of Ethics?
Correct Answer:
C
- (Exam Topic 10)
What is the MOST effective method for gaining unauthorized access to a file protected with a long complex password?
Correct Answer:
C