Which of the following is MOST important to ensure the alignment of an information security program with the organizational strategy?
An organization has suffered from a large-scale security event impacting a critical system. Following the decision to restore the system at an alternate location, which plan should be invoked?
An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?
Who should be responsible for determining the level of data classification required for an application related to a new line of business?
Which of the following BEST enables an organization to provide ongoing assurance that legal and regulatory compliance requirements can be met?
Which of the following is the MOST important reason to involve external forensics experts in evidence collection when responding to a major security breach?
Which of the following BEST ensures timely and reliable access to services?
An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?
Which of the following BEST enables an information security manager to obtain organizational support for the implementation of security controls?
Which or the following is MOST important to consider when determining backup frequency?
What is the MOST important consideration when establishing metrics for reporting to the information security strategy committee?
In addition to executive sponsorship and business alignment, which of the following is MOST critical for information security governance?
Which of the following is the BEST way to address data availability concerns when outsourcing information security administration?
Which of the following is MOST helpful in determining the criticality of an organization's business functions?
A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?
Which of the following is the MOST effective way to convey information security responsibilities across an organization?
Which of the following would BEST help to ensure appropriate security controls are built into software?
Which of the following presents the GREATEST challenge to a security operations center's wna GY of potential security breaches?
The PRIMARY advantage of involving end users in continuity planning is that they:
Which of the following is MOST important to the effectiveness of an information security steering committee?
Which of the following is the MOST important reason for logging firewall activity?
Which of the following is an example of a change to the external threat landscape?
Which of the following metrics provides the BEST evidence of alignment of information security governance with corporate governance?
Which of the following BEST enables an incident response team to determine appropriate actions during an initial investigation?
Which of the following should be done NEXT following senior management's decision to comply with new personal data regulations that are much more stringent than those currently followed to avoid massive fines?
Which of the following is MOST important to include in an incident response plan to ensure incidents are responded to by the appropriate individuals?
Which of the following is the PRIMARY benefit of training service desk staff to recognize incidents?
Which of the following is necessary to ensure consistent protection for an organization's information assets?
Identifying which of the following BEST enables a cyberattack to be contained?
Which of the following is MOST important to ensuring that incident management plans are executed effectively?
Which of the following BEST indicates that information security governance and corporate governance are integrated?
Which of the following is the MOST common cause of cybersecurity breaches?
Which of the following provides the BEST evidence that a recently established infofmation security program is effective?
Which of the following should be the NEXT step after a security incident has been reported?
Of the following, who is BEST suited to own the risk discovered in an application?
Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?
When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?
An information security team is investigating an alleged breach of an organization's network. Which of the following would be the BEST single source of evidence to review?
Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?
Which of the following should an information security manager do FIRST when developing an organization's disaster recovery plan (DRP)?
Which type of system is MOST effective for monitoring cyber incidents based on impact and tracking them until they are closed?
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?
A common drawback of email software packages that provide native encryption of messages is that the encryption:
When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?
An information security manager has become aware that a third-party provider is not in compliance with the statement of work (SOW). Which of the following is the BEST course of action?
Which of the following is MOST important for an information security manager to verify when selecting a third-party forensics provider?
Which of the following is the PRIMARY objective of information asset classification?
An information security manager is working to incorporate media communication procedures into the security incident communication plan. It would be MOST important to include:
Which of the following processes is MOST important for the success of a business continuity plan (BCP)?
A global organization is planning to expand its operations into a new country with stricter data protection regulations than those in the headquarters' home country. Which of the following is the BEST approach for adopting these new requirements?
The PRIMARY objective of a post-incident review of an information security incident is to:
Which of the following MUST be established to maintain an effective information security governance framework?
Which of the following is MOST important to consider when defining control objectives?
Which of the following is the BEST way to help ensure alignment of the information security program with organizational objectives?
Which of the following backup methods requires the MOST time to restore data for an application?
Which of the following is the BEST indication of an effective information security awareness training program?
An experienced information security manager joins a new organization and begins by conducting an audit of all key IT processes. Which of the following findings about the vulnerability management program should be of GREATEST concern?
Which of the following is a desired outcome of information security governance?
Which of the following provides an information security manager with the MOST accurate indication of the organization's ability to respond to a cyber attack?
Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?
Which of the following BEST helps to ensure a third-party backup site continues to meet the organization’s information security standards?
Which of the following is the MOST effective way to determine the alignment of an information security program with the business strategy?
The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:
Which of the following is the MOST essential element of an information security program?
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
Which of the following is the BEST indication ofa successful information security culture?
Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?
When determining an acceptable risk level which of the following is the MOST important consideration?
Which of the following is the BEST way to compete for funding for an information security program in an organization with limited resources?
The BEST way to report to the board on the effectiveness of the information security program is to present:
Prior to conducting a forensic examination, an information security manager should:
Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?
When deciding to move to a cloud-based model, the FIRST consideration should be:
Which of the following should be given the HIGHEST priority during an information security post-incident review?
An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?
Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?
Which of the following is the GREATEST benefit of classifying information security incidents?
The BEST way to identify the risk associated with a social engineering attack is to:
Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?
Which of the following is the BEST approach for governing noncompliance with security requirements?
Following a risk assessment, an organization has made the decision to adopt a bring your own device (BYOD) strategy. What should the information security manager do NEXT?
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
An internal audit has revealed that a number of information assets have been inappropriately classified. To correct the classifications, the remediation accountability should be assigned to:
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
Which of the following BEST determines the allocation of resources during a security incident response?
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:
Which of the following sources is MOST useful when planning a business-aligned information security program?
Which of the following should be an information security manager's PRIMARY concern when an organization is expanding business to a new country?
Which of the following should be the PRIMARY focus of an organization with immature incident detection capabilities?
Which of the following is MOST important when conducting a forensic investigation?
A new risk has been identified in a high availability system. The BEST course of action is to:
An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?
The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?
An organization experienced a loss of revenue during a recent disaster. Which of the following would BEST prepare the organization to recover?
The PRIMARY goal of the eradication phase in an incident response process is to:
Which of the following is the FIRST step when conducting a post-incident review?
Which of the following is the BEST way to obtain organization-wide support for an information security program?
Which of the following is MOST important to include in security incident escalation procedures?
An organization is implementing an information security governance framework. To communicate the program's effectiveness to stakeholders, it is MOST important to establish:
An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?
Which of the following should be the PRIMARY basis for an information security strategy?
Of the following, who is MOST appropriate to own the risk associated with the failure of a privileged access control?
Which of the following metrics would provide an accurate measure of an information security program's performance?
Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
An information security manager is updating the organization's incident response plan. Which of the following is the BEST way to validate that the process and procedures provided by IT and business units are complete, accurate, and known by all responsible teams?
An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
Which of the following is MOST important to have in place when conducting a security control assessment of a system?
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?
Which risk is introduced when using only sanitized data for the testing of applications?
Which of the following provides the BEST assurance that security policies are applied across business operations?
Which of the following BEST determines an information asset's classification?
Management has announced the acquisition of a new company. The information security manager of the parent company is concerned that conflicting access rights may cause critical information to be exposed during the integration of the two companies. To BEST address this concern, the information security manager should:
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager's FIRST step in addressing the issue should be to:
Which is MOST important to identify when developing an effective information security strategy?
Which of the following is the BEST justification for making a revision to a password policy?
Which of the following is the BEST indication of an effective information security program?
What should be an information security manager's FIRST step when developing a business case for a new intrusion detection system (IDS) solution?
In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:
The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:
Which of the following BEST minimizes information security risk in deploying applications to the production environment?
Which of the following is MOST important for the information security manager to include when presenting changes in the security risk profile to senior management?
Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
Which of the following BEST supports information security management in the event of organizational changes in security personnel?
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
Which of the following would BEST ensure that security is integrated during application development?
Threat and vulnerability assessments are important PRIMARILY because they are:
The MOST important reason for having an information security manager serve on the change management committee is to:
Which of the following would BEST enable the timely execution of an incident response plan?
Which of the following is the BEST control to protect customer personal information that is stored in the cloud?
To prepare for a third-party forensics investigation following an incident involving malware, the incident response team should:
Which of the following BEST protects against emerging advanced persistent threat (APT) actors?
An organization has remediated a security flaw in a system. Which of the following should be done NEXT?
Which of the following BEST enables an organization to maintain an appropriate security control environment?
Which of the following is the GREATEST benefit of using AI tools in security operations?
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
Which of the following is the PRIMARY responsibility of the information security function when an organization adopts emerging technologies?
To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:
Which of the following is the BEST course of action when using a web application that has known vulnerabilities?
Which of the following is MOST appropriate to communicate to senior management regarding information risk?
A data loss prevention (DLP) tool has flagged personally identifiable information (Pll) during transmission. Which of the following should the information security manager do FIRST?
Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?
Which of the following is the BEST way to determine the effectiveness of an incident response plan?
Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?
Which of the following is MOST important for guiding the development and management of a comprehensive information security program?
Which of the following should be done FIRST when developing a business continuity plan (BCP)?
Which of the following BEST indicates the effectiveness of the vendor risk management process?
Of the following, who should be assigned as the owner of a newly identified risk related to an organization's new payroll system?
Which of the following should be the FIRST consideration when developing a strategy for protecting an organization's data?
Which of the following is MOST important to include in an information security status report management?
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
Which of the following provides the BEST input to determine the level of protection needed for an IT system?
An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?
Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?
Which of the following should be done FIRST when a SIEM flags a potential event?
Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?
A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:
Which of the following is the BEST reason for senior management to support a business case for developing a monitoring system for a critical application?
Which of the following MUST happen immediately following the identification of a malware incident?
Which of the following should be done FIRST when establishing an information security governance framework?
Which of the following is the MOST important factor in an organization's selection of a key risk indicator (KRI)?
Which of the following BEST facilitates effective strategic alignment of security initiatives?
What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?
The categorization of incidents is MOST important for evaluating which of the following?
Which of the following BEST enables an organization to transform its culture to support information security?
Which of the following is the BEST way to obtain support for a new organization-wide information security program?
Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?
Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?
Security administration efforts will be greatly reduced following the deployment of which of the following techniques?
Which of the following BEST facilitates the development of a comprehensive information security policy?
A technical vulnerability assessment on a personnel information management server should be performed when:
An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?
Senior management wants to thoroughly test a disaster recovery plan (DRP) for a mission-critical system. Which of the following would provide the MOST reliable results?
Which of the following is the MOST important reason to consider organizational culture when developing an information security program?
Which of the following is MOST important to have in place for an organization's information security program to be effective?
Which of the following activities is designed to handle a control failure that leads to a breach?
Which of the following is CRITICAL to ensure the appropriate stakeholder makes decisions during a cybersecurity incident?
Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?
An organization is considering using a third party to host sensitive archived data. Which of the following is MOST important to verify before entering into the relationship?
Which of the following is the PRIMARY role of an information security manager in a software development project?
An information security manager has identified that security risks are not being treated in a timely manner. Which of the following
Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?
An information security manager has been notified that two senior executives have the ability to elevate their own privileges in the corporate accounting system, in violation of policy. What is the FIRST step to address this issue?
Which of the following is MOST important to the effectiveness of an information security program?
Which of the following would be MOST helpful when creating information security policies?
An organization is in the process of defining policies for employee use of social media. It is MOST important for the information security manager to:
To support effective risk decision making, which of the following is MOST important to have in place?
To effectively manage an organization's information security risk, it is MOST important to:
An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?
To improve the efficiency of the development of a new software application, security requirements should be defined:
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
The executive management of a domestic organization has announced plans to expand operations to multiple international locations. Which of the following should be the information security manager's FIRST step upon learning of these plans?
Which of the following should be the FIRST step in developing an information security strategy?
An organization would like to invest in a new emerging technology. Which of the following is MOST important for the information security manager to consider when evaluating its impact?
Which of the following would be MOST useful to help senior management understand the status of information security compliance?
The results of a risk assessment for a potential network reconfiguration reveal a high likelihood of sensitive data being compromised. What is the information security manager's BEST course of
action?
Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?
Once a suite of security controls has been successfully implemented for an organization's business units, it is MOST important for the information security manager to:
An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?
Which of the following BEST illustrates residual risk within an organization?
Which of the following parties should be responsible for determining access levels to an application that processes client information?
Which of the following is the MOST effective way to ensure the security of services and solutions delivered by third-party vendors?
An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:
Which of the following is the MOST appropriate risk response when the risk impact has been determined to be immaterial and the likelihood is very low?
A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?
Meeting which of the following security objectives BEST ensures that information is protected against unauthorized disclosure?
Which of the following is the BEST way to determine the gap between the present and desired state of an information security program?
Which of the following would BEST ensure that security risk assessment is integrated into the life cycle of major IT projects?
A new type of ransomware has infected an organization's network. Which of the following would have BEST enabled the organization to detect this situation?
Business objectives and organizational risk appetite are MOST useful inputs to the development of information security:
Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?
Which of the following is the BEST indication of an effective disaster recovery planning process?
Which of the following is MOST important when designing an information security governance framework?
Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?
Which of the following is the MOST important consideration when determining which type of failover site to employ?
Which of the following will BEST facilitate the integration of information security governance into enterprise governance?
An information security team has started work to mitigate findings from a recent penetration test. Which of the following presents the GREATEST risk to the organization?
An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?
An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:
• A bad actor broke into a business-critical FTP server by brute forcing an administrative password
• The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
• The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
• After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail
Which of the following could have been prevented by conducting regular incident response testing?
Which of the following should be the PRIMARY area of focus when mitigating security risks associated with emerging technologies?
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
Which of the following is the PRIMARY reason to assign a risk owner in an organization?
An organization's HR department requires that employee account privileges be removed from all corporate IT systems within three days of termination to comply with a government regulation However, the systems all have different user directories, and it currently takes up to four weeks to remove the privileges Which of the following would BEST enable regulatory compliance?
Which of the following should an information security manager do FIRST to address the risk associated with a new third-party cloud application that will not meet organizational security requirements?
Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
Which of the following is the MOST effective way to increase security awareness in an organization?
When collecting admissible evidence, which of the following is the MOST important requirement?
Which of the following has the GREATEST influence on the successful integration of information security within the business?
Which of the following components of an information security risk assessment is MOST valuable to senior management?
Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?
Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?
An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?
A finance department director has decided to outsource the organization's budget application and has identified potential providers. Which of the following actions should be initiated FIRST by IN information security manager?
Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?
Which of the following is the BEST way to evaluate the effectiveness of physical and environmental security controls implemented for fire-related disasters?
The contribution of recovery point objective (RPO) to disaster recovery is to:
What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?
Which of the following is MOST effective for communicating forward-looking trends within security reporting?
Which of the following BEST demonstrates the added value of an information security program?
Which of the following is the BEST indicator of a successful intrusion into an organization's systems?
Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?
To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?
When creating an incident response plan, the PRIMARY benefit of establishing a clear definition of a security incident is that it helps to:
Which of the following is the MOST effective way to prevent information security incidents?
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?
Which of the following should be updated FIRST to account for new regulatory requirements that impact current information security controls?
Which of the following should be the FIRST step when performing triage of a malware incident?
Which of the following provides the BEST indication of the return on information security investment?
When defining a security baseline, it is MOST important that the baseline:
Which of the following is MOST effective in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application?
For the information security manager, integrating the various assurance functions of an organization is important PRIMARILY to enable:
Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?
The PRIMARY consideration when responding to a ransomware attack should be to ensure:
What type of control is being implemented when a security information and event management (SIEM) system is installed?
Recommendations for enterprise investment in security technology should be PRIMARILY based on:
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
An organization has an ongoing security awareness training program. Employee participation has been decreasing over the year, while the number of malware and phishing incidents from email has been increasing. What is the information security manager's BEST course of action?
Which of the following is the MOST important consideration when defining control objectives?
An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.
Which of the following should be given immediate focus?
Which of the following is the PRIMARY benefit of implementing an information security governance framework?
Management decisions concerning information security investments will be MOST effective when they are based on:
Which of the following is the PRIMARY advantage of an organization using Disaster Recovery as a Service (DRaaS) to help manage its disaster recovery program?
The effectiveness of an information security governance framework will BEST be enhanced if:
Which of the following should an information security manager do FIRST when there is a conflict between the organization's information security policy and a local regulation?
When an organization experiences a disruptive event, the business continuity plan (BCP) should be triggered PRIMARILY based on:
Which of the following BEST enables an organization to effectively manage emerging cyber risk?
Implementing the principle of least privilege PRIMARILY requires the identification of: