Personality Trait Assessment

1. What step would you possible take in the event of a zero day vulnerability?

  1. A.

    I will anticipate the potential impacts on critical assets and recommend applicable security measures

  2. B.

    I will immediately assess enterprise relevant IT assets for any impact and recommend applicable security measures

  3. C.

    I immediately provide a detailed report of the incident

  4. D.

    I will be observant to the availability of possible fixes

Select one of the answers

2. Your organisation is about to embark on a new project iniative of integrating a 3rd Party payment gateway into the system. What would be your first line of action as an Information Security Analyst?

  1. A.

    Assess and track threats and vulnerabilities to systems within the network infrastructure

  2. B.

    Analyse the sysytem to identify and recommend IT security control requirements to mitigate potential risks

  3. C.

    Develop an IT security control framework for verifying IT security control effeectiveness

  4. D.

    Perform security assessment of the system and recommend remediation

Select one of the answers

3. You became aware that a sister company experienced a security breach. What role would you like to perform?

  1. A.

    I will proactive step to check the systems and nertwork for any indicators of compromise (IOC) and recommend remedial processes in order to avoid similar security incidents.

  2. B.

    I will adopt a systematic approach to identify the tactics, technique and procedures of the attack

  3. C.

    I will collaborate with teams to apply the best controls to protect organisation' critical assets against such attack

  4. D.

    I will analyse the attack patterns for security insight

Select one of the answers

4. You received a spam email on your work computer. What action would you take?

  1. A.

    I will avoid the cyber risk of opening the file to prevent spreading it to other system.

  2. B.

    I will carefully check for inconsistent informations

  3. C.

    I will broadcast the security incident to other in tthe team

  4. D.

    I will logically assess the security incident to secure the systems from similar incident

Select one of the answers

5. You became aware that your organisation had suffered a security breach. What role would you like to perform?

  1. A.

    I will perform thorough surveillance and monitoring of organisations' systems and nework operations

  2. B.

    I will conduct a technical investigation to identify computer and network intrusions

  3. C.

    I establish communication protocols and procedures and produce a detailed security incident reports for management

  4. D.

    I will perform research and analysis on emerging threat sources

Select one of the answers

6. What role would you prefer in ensuring the protection of your organisations' IT assets from unathorised users.

  1. A.

    Monitoring systems and network for security anomalies

  2. B.

    Deploying solution that prevents unauthorised access

  3. C.

    Engaging with multiple stakeholders to failitate incident response

  4. D.

    Triaging and prioritizing security incidents and alerts against business risks

Select one of the answers

7. What would you do to help an organisation align or comply with security best practices?

  1. A.

    By facilitating the development of IT security control baselines and procesess in compliance with standards and frameworks.

  2. B.

    By recommending best security controls during Change Advisory Board meetings

  3. C.

    By seeking and sharing technical knowledge with collleagues

  4. D.

    By investigating incidents and responding to events in real time andi fxing vulnerabilities

Select one of the answers

8. A widely utilised third party library have been exposed to vulnerability that was not widely known to the security community, and that there are no currently known definitions/listings in common vulnerability databases or collections. What would be your first line of action?

  1. A.

    Evaluate potential risks and develop security standards, procedures, and controls to manage risks in line with framework and regulations

  2. B.

    Review and develop policies and procedures to manage risks associated with similar security incidents in future

  3. C.

    Engaging with multiple stakeholders to understand the security incident and ownership of controls to monitor associated risks

  4. D.

    Collect and analyze incident data, establish facts and draw valid conclusions

Select one of the answers

9. Your organisation is about to outsourse some critical services. What role are you more likely to provide in the end-to-end engagenment with the varying service providers?

  1. A.

    To gather information security controls evidence from vendors in compliance with business requirements and third party risk management framework

  2. B.

    Analyse collated data and categorise service providers based on vendor residual and associated risks for proper monitoring

  3. C.

    Explain with simple terms technical concepts to non-technical stakeholders

  4. D.

    Collaborate and communicate with stakeholders business partners, third party/ supplier Business Activity Owners (BAOs) to monitor vendor associated risks

Select one of the answers

10. Which of the following soft skills would you say you’re best at?

  1. A.

    Investigative

  2. B.

    Analytical

  3. C.

    Managing

  4. D.

    Engaging

Select one of the answers

11. How would you describe your experience in identifying and addressing cybersecurity threats?

  1. A.

    I don't have much experience in the security field

  2. B.

    I've gained some experience working with networks, but Ihave a lot to learn

  3. C.

    I know how to protect my network and combat threats but I am just starting to learn how to proactively analyse behavior and prevent attacks

  4. D.

    I'm the proud holder of almost every certification you can name and have spent number of years working in IT security

Select one of the answers

12. Which of these are you more comfortable with?

  1. A.

    Helping others with basic cybersecurity knowledge

  2. B.

    Testing network for security loopholes

  3. C.

    Analysing users and systems data to identify cybersecurity threats

  4. D.

    Managing threats and cybersecuirty incidents

Select one of the answers

13. At what level would you say your cybersecuirty & IT security skills are?

  1. A.

    Beginner

  2. B.

    Intermediate

  3. C.

    Advance

  4. D.

    Master

Select one of the answers

14. As your organisations expand their IT ecosystems with extra tools like mobile apps and web applications. What step would you take to reduce the chances of threat actors attempting to infiltrate to gain access to your corporate network?

  1. A.

    Carry out a security assessment of the corporate network to identify any weakness

  2. B.

    Attempt to exploit any vulnerability using a systematic approach

  3. C.

    Communicate any security issue with possible remediation

  4. D.

    Assess the potential impacts and risks of any identified security flaws

Select one of the answers

15. What sort of role would you possibly fit into in ensuring the overall protection of an organisation IT assets from threats?

  1. A.

    Oversee the monitoring of all IT security operations and infrastructures, policies and regulatory compliance, and to manage the deployment and maintainance of IT security tools and technology

  2. B.

    Select appropriate controls and framework to secure the company's assets in line with business objectives

  3. C.

    Ensure the design and implementation of secure IT network system with appropriate endpoint security measures

  4. D.

    Develop and communicate high-level IT security reports influencing management strategic security decisions

Select one of the answers

16. Which of these words best describes you?

  1. A.

    Outgoing

  2. B.

    Thorough

  3. C.

    Practical

  4. D.

    Smart

Select one of the answers

17. What role would you possibly play to ensure a company's IT systems are functional, secure, efficient and of high quality?

  1. A.

    Gain a good understanding of the company's IT security controls requiremments

  2. B.

    Have a clear picture of the organisation's IT processes, system and network

  3. C.

    Assess the quality of company's system network and effectiveness of implemented controls

  4. D.

    Effectively collaborate and report IT security findings with company's stakeholders

Select one of the answers

18. As a potential auditor, what steps can you take to ensure that an organizational data security procedures are in alignment with the ISO27001 standards?

  1. A.

    Stay within the purview of ISO 27001 standards while conducting an ISMS audit

  2. B.

    Assess the control effectiveness within the scope of the company's ISMS implementation

  3. C.

    Pre-design and communicate an audit plan and report any gap with the resolution timeline

  4. D.

    Always maintain a zero trust approach

Select one of the answers

19. Which are you most interested in doing?

  1. A.

    Designing

  2. B.

    Organising

  3. C.

    Discussing ideas

  4. D.

    Solving problems

Select one of the answers

20. What would you describe as your predominant strength?

  1. A.

    Inquisitive

  2. B.

    Integrity

  3. C.

    Detail-oriented

  4. D.

    Tech-know how

Select one of the answers

Time left:

00

hours

00

minutes

00

seconds

Question