TQ Session - Security

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7
At a glance
Powered by AI
Accenture embeds security in all aspects of client work and helps clients address even complex cyber challenges.

Accenture recommends accelerators that can deploy specific security controls in hours.

Accenture recommends developing a long-term security strategy which includes a risk management plan.

TQ Session – Security

What is Accenture’s approach when it comes to helping


our clients with security?
 Embed security in all aspects of the client work, solving even the most complex of the
client’s cyber challenges

 Create a universal security solution to fit the needs of all clients. Accenture's unique
platform can be embedded in any client architecture.

 Help the client create a secure, in-house data center, that follows international regulations
such as ISO 27001.

 Address the client’s security risks only after they arrive. A data breach opens all doors on
selling new security deals.

Accenture is working with a client to improve their


current security infrastructure. The client wants to
redefine the security programs, create long-term plans for
effective audits, and proactively plan against future
threats. What might Accenture recommend to this client?
 Develop a long-term security strategy which includes a risk management plan.

 Use a complete offshore security practice of security experts to monitor security events.

 Create a cybersecurity team of internal, client team experts who partner with external
experts, whose focus is strictly internal audits.

 Create an improved operational technical security practice that leverages new and
improved practices.
Which term refers to the process of creating and
deploying applications that are secure from the start?
 Waterfall

 Risk Management

 Compliance Assessment

 DevOps

What does “The Principle of Least Privilege” mean as


applied to security?
 Each user should have only the absolute minimum permissions necessary to complete
their current responsibilities.

 Users who were recently hired within an organization should hold the lowest levels of
user permissions.

 Permanent access to an organization’s most critical assets should be limited to the current
administrator.

 Access to sensitive data should be granted only to executives in the company.

Accenture is helping a major retailer migrate to the


Cloud. The client has aggressive timelines and is worried
that security will be compromised. How can Accenture
help the client?
 Accenture should advise the client to wait until the next phase to implement security
controls.

 Accenture recommends that the additional security controls are not needed since the
Cloud is secure by default.

 Accenture should develop a custom solution and suggest a timeline extension.


 Accenture has developed accelerators that can deploy specific security controls in hours, a
task that used to take months.

Following a client security incident, Accenture performs


an in-depth analysis of every step taken by the attackers.
Accenture can suggest permanent mitigations and then
test the implementation. Which term describes this
process?
 Incident Response

 Social Engineering

 Firewall Performance Tuning

 Money Laundering

Accenture has engaged with a new financial client who is


looking for a comprehensive, company-wide security
solution, and has operations in Europe. When designing
the client’s solution, what is the order of importance
related to Confidentiality, Integrity and Availability
(CIA)?
 Confidentiality because of the industry and regulations followed by Integrity, then
Availability.

 Confidentiality, Integrity and Availability are strictly controlled by the European


government.

 Availability to protect the lives of the operators followed by Confidentiality, then


Integrity
 Integrity to make sure money is transferred to the appropriate accounts followed by
Availability then Confidentiality.

A solar energy company learns of several recent cyber-


attacks targeting other companies in their industry and
realizes they could be next. The company initiates an
analysis to weigh the measures needed to counter the
potential threat and minimizing the impact to their
business in case those are exploited. Which security
principle is illustrated in this example?
 Compliance

 Governance

 Accessibility

 Risk Management

Which term refers to a process that is deployed to ensure


the confidentiality and integrity of data while being
stored or when it is transmitted?
 Encryption

 Cloud Computing

 Access Management

 Security Operations

What is an example of an internal threat?


 A contractor resets their company login password by answering security questions sent to
a personal email address.

 A contractor visits people.accenture.com page from their phone, trying to research a


consultant.

 An employee deletes all files associated with an important project on an internal server.

 A Data Analyst accesses an Excel data file on a team webpage and creates a pivot table
with survey responses.

A Product Manager has been given responsibility for


overseeing the development of a new software
application that will be deployed to a group of Accenture
clients. What would be the most time-saving and cost-
effective way for the Product Manager to address the
new application’s security considerations?
 Utilize a DevSecOps approach to incorporate security into the development process from
the beginning.
 Contract with an external vendor to develop a security solution separately from the main
application.
 Design the application’s security features after the application’s initial build is complete.
 Schedule development of security features after the application’s initial release.

What are the three main goals of security?


 Governance, Risk Management, and Compliance
 Confidentiality, Integrity, and Availability
 Data Security, Product Security, and Application Security
 Cyber Defense, Cyber Intelligence, and Managed Security Services

For what reason can security risks never be fully


eliminated?
 Implementing new security measures is not important.
 The threat landscape is constantly evolving with new threats emerging all the time.
 New security regulations make it impossible for organizations to evaluate security risks.
 There is no secure way to ensure the integrity of data when it is in transit.

The European Union (EU)’s General Data Privacy


Regulation (GDPR) places a broad number of restrictions
on the collection and transfer of individuals’ personal
data. A company based in the US that does business with
several clients in the EU realizes that not all of its current
security practices align with GDPR standards. The
company drafts an action plan to address these issues and
resolve them accordingly. Which security principle is
illustrated in this example?
 Governance
 Risk Management
 Compliance
 Confidentiality

An international pharmaceutical company is fully


compliant with local and international regulations.
However, they suffered a major data breach that
exploited a six-month-old vulnerability. The CIO asked
Accenture "How this can be possible?" How should
Accenture respond?
 Because the security policy documentation was not kept up to date.
 Because the local and international compliance laws conflict.
 Because compliance to local and international laws does not necessarily enforce security.
 Because the Security Operations team does not handle compliance issues.

You might also like