An organization has purchased an Internet sales company to extend the sales department. The information security manager's FIRST step to ensure the security policy framework encompasses the new business model is to:
Which of the following BEST supports information security management in the event of organizational changes in security personnel?
Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?
An organization has determined that fixing a security vulnerability in a critical application is too costly to be feasible, but the impact is material to the business. Which of the following is the MOST appropriate risk treatment?
An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?
Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?
Which of the following should an information security manager do FIRST when a vulnerability has been disclosed?
Which of the following is the MOST common cause of cybersecurity breaches?
Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?
Which of the following is the PRIMARY reason to use a phased incident recovery approach?
Which of the following is the PRIMARY objective of a cyber resilience strategy?
An organization is planning to outsource network management to a service provider. Including which of the following in the contract would be the MOST effective way to mitigate information security risk?
Which of the following BEST indicates misalignment of security policies with business objectives?
When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:
When integrating security risk management into an organization it is MOST important to ensure:
Which of the following is the MOST important detail to capture in an organization's risk register?
Which of the following will BEST facilitate integrating the information security program into corporate governance?
An organization plans to offer clients a new service that is subject to regulations. What should the organization do FIRST when developing a security strategy in support of this new service?
Which of the following is the MOST important reason for logging firewall activity?
Which of the following BEST facilitates effective strategic alignment of security initiatives?
Which of the following BEST indicates that information assets are classified accurately?
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
Which of the following should have the MOST influence on an organization's response to a new industry regulation?
Which of the following is MOST important to consider when aligning a security awareness program with the organization's business strategy?
Which type of recovery site is MOST reliable and can support stringent recovery requirements?
When analyzing the emerging risk and threat landscape, an information security manager should FIRST:
Which of the following is an information security manager's MOST important course of action when responding to a major security incident that could disrupt the business?
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
Which of the following tasks should be performed once a disaster recovery plan (DRP) has been developed?
Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?
The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness training program is to include:
Which of the following processes BEST supports the evaluation of incident response effectiveness?
Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
An information security manager has confirmed the organization's cloud provider has unintentionally published some of the organization's business data. Which of the following should be done NEXT?
Which of the following is MOST important to the successful implementation of an information security program?
Which of the following will result in the MOST accurate controls assessment?
Which of the following BEST enables an information security manager to demonstrate the effectiveness of the information security and risk program to senior management?
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
Which of the following is the MOST important consideration when determining which type of failover site to employ?
An organization is leveraging tablets to replace desktop computers shared by shift-based staff These tablets contain critical business data and are inherently at increased risk of theft Which of the following will BEST help to mitigate this risk''
Which of the following is MOST effective for communicating forward-looking trends within security reporting?
An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:
• A bad actor broke into a business-critical FTP server by brute forcing an administrative password
• The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
• The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
• After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail
Which of the following could have been prevented by conducting regular incident response testing?
Which of the following is MOST important for the effective implementation of an information security governance program?
Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
Which of the following is MOST important when responding to a major security incident?
Which of the following is the BEST way to obtain organization-wide support for an information security program?
Which of the following is the BEST approach to make strategic information security decisions?
The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:
To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?
Which of the following activities is MOST appropriate to conduct during the eradication phase of a cyber incident response?
What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?
Which of the following is the BEST way to determine the effectiveness of an incident response plan?
Which of the following is the FIRST step in developing a business continuity plan (BCP)?
The MOST important information for influencing management’s support of information security is:
An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?
Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:
When establishing classifications of security incidents for the development of an incident response plan, which of the following provides the MOST valuable input?
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:
Which of the following is MOST important to ensure the alignment of an information security program with the organizational strategy?
An organization has identified a weakness in the ability of its employees to identify and report cybersecurity incidents. Although training materials have been provided, employees show a lack of interest. Which of the following is the information security manager’s BEST course of action?
Which of the following is MOST important to convey to employees in building a security risk-aware culture?
Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?
An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?
Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?
Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?
Which of the following should be an information security manager's FIRST course of action when a newly introduced privacy regulation affects the business?
Which of the following would BEST enable the timely execution of an incident response plan?
The categorization of incidents is MOST important for evaluating which of the following?
Which of the following should have the MOST influence on the development of information security policies?
What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?
An information security team is investigating an alleged breach of an organization's network. Which of the following would be the BEST single source of evidence to review?
Which of the following is the PRIMARY advantage of an organization using Disaster Recovery as a Service (DRaaS) to help manage its disaster recovery program?
Which of the following is the PRIMARY responsibility of the information security function when an organization adopts emerging technologies?
While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?
Which of the following BEST supports the incident management process for attacks on an organization's supply chain?
Which of the following is MOST important in increasing the effectiveness of incident responders?
Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:
Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?
Which of the following should be the PRIMARY outcome of an information security program?
An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?
Which of the following would BEST support the business case for an increase in the information security budget?
Which of the following is the MOST important outcome of effective risk treatment?
A software vendor has announced a zero-day vulnerability that exposes an organization's critical business systems. The vendor has released an emergency patch. Which of the following should be the information security managers PRIMARY concern?
Which of the following is the MOST important consideration when establishing an organization's information security governance committee?
What should be an information security manager's MOST important consideration when developing a multi-year plan?
Which of the following is the BEST method to ensure compliance with password standards?
Which of the following is MOST important for the successful implementation of an incident response plan?
Which of the following sources is MOST useful when planning a business-aligned information security program?
During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?
Senior management has expressed concern that the organization's intrusion prevention system (IPS) may repeatedly disrupt business operations Which of the following BEST indicates that the information security manager has tuned the system to address this concern?
Which of the following BEST ensures timely and reliable access to services?
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?
An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
Which type of backup BEST enables an organization to recover data after a ransomware attack?
Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?
Which of the following BEST demonstrates that an anti-phishing campaign is effective?
An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
Which of the following is MOST important to consider when determining asset valuation?
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
Which of the following is the PRIMARY impact of organizational culture on the effectiveness of an information security program?
Senior management is concerned about data exposure through the use of public Al services. Which of the following is the information security manager's BEST course of action?
Which of the following messages would be MOST effective in obtaining senior management's commitment to information security management?
An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?
A global organization has outsourced security processes to a service provider by means of a global agreement. What is the MOST efficient approach to meet country-specific regulatory requirements?
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?
Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?
A global organization is developing an incident response team. The organization wants to keep headquarters informed of all incidents and wants to be able to present a unified response to widely dispersed events. Which of the following BEST supports these objectives?
An organization's quality process can BEST support security management by providing:
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?
When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?
Which of the following would provide the BEST evidence to senior management that security control performance has improved?
Which of the following is MOST important for an information security manager to consider when identifying information security resource requirements?
Which of the following should be the PRIMARY focus for an information security manager when reviewing access controls for data stored in an off-premise cloud environment?
Which of the following is MOST important for an information security manager to consider when reviewing a security investment plan?
Which of the following is the MOST likely reason for a vulnerability scanner to return incomplete results?
An organization's HR department requires that employee account privileges be removed from all corporate IT systems within three days of termination to comply with a government regulation However, the systems all have different user directories, and it currently takes up to four weeks to remove the privileges Which of the following would BEST enable regulatory compliance?
An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:
A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?
Which of the following is the PRIMARY role of an information security manager in a software development project?
Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?
Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?
After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:
A security incident has been reported within an organization When should an information security manager contact the information owner?
Which of the following provides the MOST useful information for identifying security control gaps on an application server?
Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?
When is the BEST time to verify that a production system's security mechanisms meet control objectives?
The MOST useful technique for maintaining management support for the information security program is:
Which of the following parties should be responsible for determining access levels to an application that processes client information?
An organization is performing due diligence when selecting a third party. Which of the following is MOST helpful to reduce the risk of unauthorized sharing of information during this process?
A risk assessment exercise has identified the threat of a denial of service (DoS) attack Executive management has decided to take no further action related to this risk. The MO ST likely reason for this decision is
Prior to implementing a bring your own device (BYOD) program, it is MOST important to:
What should be the GREATEST concern for an information security manager of a large multinational organization when outsourcing data processing to a cloud service provider?
Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?
Following an employee security awareness training program, what should be the expected outcome?
For the information security manager, integrating the various assurance functions of an organization is important PRIMARILY to enable:
When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?
A risk owner has accepted a large amount of risk due to the high cost of controls. Which of the following should be the information security manager's PRIMARY focus in this situation?
Which of the following should be done FIRST when a SIEM flags a potential event?
When determining an acceptable risk level which of the following is the MOST important consideration?
Application data integrity risk is MOST directly addressed by a design that includes:
An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
An organization has acquired a new system with strict maintenance instructions and schedules. Where should this information be documented?
Which of the following roles is BEST suited to validate user access requirements during an annual user access review?
In addition to executive sponsorship and business alignment, which of the following is MOST critical for information security governance?
Several months after the installation of a new firewall with intrusion prevention features to block malicious activity, a breach was discovered that came in through the firewall shortly after installation. This breach could have been detected earlier by implementing firewall:
Which of the following will BEST enable an effective information asset classification process?
A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?
Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?
Recommendations for enterprise investment in security technology should be PRIMARILY based on:
Which of the following should be the PRIMARY goal of information security?
Which of the following is MOST important to include in an incident response plan to ensure incidents are responded to by the appropriate individuals?
Which of the following is the BEST reason to implement a comprehensive information security management system?
To ensure continuous alignment with the organizational strategy
To gain senior management support for the information security program
To support identification of key risk indicators (KRIs)
Which of the following BEST indicates that an information security governance framework has been successfully implemented?
Which of the following is the MOST critical factor for information security program success?
Which of the following is the BEST way to determine if an information security profile is aligned with business requirements?
Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?
The PRIMARY reason to properly classify information assets is to determine:
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?
A department has reported that a security control is no longer effective. Which of the following is the information security manager's BEST course of action?
An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?
A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?
Which of the following is MOST important when designing security controls for new cloud-based services?
Which of the following is MOST important to include in security incident escalation procedures?
Which of the following is the BEST course of action when using a web application that has known vulnerabilities?
Which of the following is the BEST course of action for an information security manager to align security and business goals?
Which of the following is the PRIMARY reason to assign a risk owner in an organization?
Which of the following is the PRIMARY objective of a business impact analysis (BIA)?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
Senior management has just accepted the risk of noncompliance with a new regulation What should the information security manager do NEX*P
An organization is in the process of defining policies for employee use of social media. It is MOST important for the information security manager to:
Which of the following will have the GREATEST influence on the successful adoption of an information security governance program?
The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:
What should a global information security manager do FIRST when informed that a new regulation with significant impact will go into effect soon?
Which of the following is the MOST critical input to developing policies, standards, and procedures to secure information assets?
When building support for an information security program, which of the following elements is MOST important?
Which of the following BEST prepares a computer incident response team for a variety of information security scenarios?
In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?
Which of the following would be MOST helpful when creating information security policies?
After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?
Which of the following should be the PRIMARY consideration when developing an incident response plan?
A new regulatory requirement affecting an organization's information security program is released. Which of the following should be the information security manager's FIRST course of action?
Which of the following BEST enables an organization to effectively manage emerging cyber risk?
Which of the following is established during the preparation phase of an incident response plan?
Which of the following has the GREATEST influence on the successful integration of information security within the business?
Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?
An organization's disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?
Which of the following is the MOST important characteristic of an effective information security metric?
Which of the following should an information security manager do FIRST upon learning that a competitor has experienced a ransomware attack?
Which of the following would BEST guide the development and maintenance of an information security program?
Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?
Which of the following is the MOST important requirement for a successful security program?
Which is MOST important to identify when developing an effective information security strategy?
Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or
The PRIMARY consideration when responding to a ransomware attack should be to ensure:
Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?
An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?
Which of the following will BEST enable an organization to meet incident response requirements when outsourcing its incident response function?
When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:
Which of the following processes is MOST important for the success of a business continuity plan (BCP)?
If the investigation of an incident is not completed within the time allocated in the incident response plan, which of the following actions should be taken by the incident response team?
Which of the following is the BEST indicator of the maturity level of a vendor risk management process?
Which of the following is MOST important when developing an information security strategy?
Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?
The MAIN benefit of implementing a data loss prevention (DLP) solution is to:
An online bank identifies a successful network attack in progress. The bank should FIRST:
After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?
Communicating which of the following would be MOST helpful to gain senior management support for risk treatment options?
The information security manager of a multinational organization has been asked to consolidate the information security policies of its regional locations. Which of the following would be of
GREATEST concern?
Which of the following is MOST important to the effectiveness of an information security steering committee?
Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?
Which of the following is MOST important to determine following the discovery and eradication of a malware attack?
Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?
Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?
Which of the following BEST enables an organization to operate smoothly with reduced capacities when service has been disrupted?
Which of the following is MOST helpful to identify whether information security policies have been followed?
Which of the following is the PRIMARY reason to review the firewall logs when an external network-based attack is reported by the intrusion detection system (IDS)?
Which is following should be an information security manager's PRIMARY focus during the development of a critical system storing highly confidential data?
Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?
An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
Which of the following should be established FIRST when implementing an information security governance framework?
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
Which of the following components of an information security risk assessment is MOST valuable to senior management?
An organization's information security manager reads on social media that a recently purchased vendor product has been compromised and customer data has been posted online. What should the information security manager do FIRST?
Management would like to understand the risk associated with engaging an Infrastructure-as-a-Service (laaS) provider compared to hosting internally. Which of the following would provide the BEST method of comparing risk scenarios?
Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?
Which of the following is the FIRST step when conducting a post-incident review?
Which of the following is the MOST important factor of a successful information security program?
An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
Which of the following is MOST important to the effectiveness of an information security program?
Which of the following has the MOST influence on the inherent risk of an information asset?
Which of the following would be MOST useful when determining the business continuity strategy for a large organization's data center?
During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?
Which of the following is MOST appropriate for an organization to consider when defining incident classification and categorization levels?
Which of the following is the BEST indication of an effective information security program?
Which of the following should be the FIRST step in developing an information security strategy?
Which of the following should an information security manager do FIRST when there is a conflict between the organization's information security policy and a local regulation?
Which of the following is the PRIMARY reason to conduct a post-incident review?
Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?
Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?
An information security policy was amended recently to support an organization's new information security strategy. Which of the following should be the information security manager's NEXT step?
An information security program is BEST positioned for success when it is closely aligned with:
Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?
Which of the following is the BEST way to enhance training for incident response teams?
Business objectives and organizational risk appetite are MOST useful inputs to the development of information security:
Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?
Which of the following should be the FIRST step in developing an information security strategy?
When developing an asset classification program, which of the following steps should be completed FIRST?
Which of the following provides the BEST evidence that a recently established infofmation security program is effective?
Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?
Which of the following is MOST important to include in a post-incident review following a data breach?
Which of the following BEST supports effective communication during information security incidents7
An organization has been penalized by regulatory authorities for failing to notify them of a major security breach that may have compromised customer data. Which of the following is MOST likely in need of review and updating to prevent similar penalties in the future?
Which of the following backup methods requires the MOST time to restore data for an application?
Which type of plan is PRIMARILY intended to reduce the potential impact of security events that may occur?
Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?