Which of the following should be the FIRST step in patch management procedures when receiving an emergency security patch?
Following a risk assessment, an organization has made the decision to adopt a bring your own device (BYOD) strategy. What should the information security manager do NEXT?
Which of the following would MOST effectively ensure that a new server is appropriately secured?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
Which of the following is the BEST indication of an effective disaster recovery planning process?
Which of the following is MOST important for the information security manager to include when presenting changes in the security risk profile to senior management?
An information security manager has been asked to provide both one-year and five-year plans for the information security program. What is the PRIMARY purpose for the long-term plan?
For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?
An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?
Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?
An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
Which of the following is ESSENTIAL to ensuring effective incident response?
A new information security manager finds that the organization tends to use short-term solutions to address problems. Resource allocation and spending are not effectively tracked, and there is no assurance that compliance requirements are being met. What should be done FIRST to reverse this bottom-up approach to security?
Which of the following is the BEST way to help ensure alignment of the information security program with organizational objectives?
Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?
An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?
If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:
Which of the following is the BEST course of action after management has reviewed an identified risk and determines the risk is below the defined risk appetite?
Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?
Which of the following is MOST important to convey to employees in building a security risk-aware culture?
Which of the following would provide the MOST effective security outcome in an organizations contract management process?
Which of the following is the BEST indication of information security strategy alignment with the “&
Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?
An organization's disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?
An employee who is a remote user has copied financial data from the corporate server to a laptop using virtual private network (VPN) connectivity. Which of the following is the MOST important factor to determine if it should be classified as a data leakage incident?
Which of the following is MOST important for an information security manager to consider when identifying information security resource requirements?
Which of the following is the BEST course of action for an information security manager to align security and business goals?
The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?
In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?
Which of the following is MOST important for an information security manager to consider when developing a business continuity plan (BCP) for ransomware attacks?
Which of the following is the MOST important requirement for a successful security program?
Which of the following security initiatives should be the FIRST step in helping an organization maintain compliance with privacy regulations?
An experienced information security manager joins a new organization and begins by conducting an audit of all key IT processes. Which of the following findings about the vulnerability management program should be of GREATEST concern?
Which of the following provides an information security manager with the MOST accurate indication of the organization's ability to respond to a cyber attack?
A department has reported that a security control is no longer effective. Which of the following is the information security manager's BEST course of action?
Data entry functions for a web-based application have been outsourced to a third-party service provider who will work from a remote site Which of the following issues would be of GREATEST concern to an information security manager?
Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?
Which of the following BEST enables an information security manager to demonstrate the effectiveness of the information security and risk program to senior management?
Which of the following is MOST important to include in an information security status report to senior management?
Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?
Which of the following is necessary to ensure consistent protection for an organization's information assets?
Which of the following should be the PRIMARY goal of information security?
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?
An information security manager wants to upgrade an organization’s workstations to a new operating system version. Which of the following would be MOST helpful to gain senior management support for the upgrade?
To effectively manage an organization's information security risk, it is MOST important to:
An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?
An organization's HR department requires that employee account privileges be removed from all corporate IT systems within three days of termination to comply with a government regulation However, the systems all have different user directories, and it currently takes up to four weeks to remove the privileges Which of the following would BEST enable regulatory compliance?
An information security manager is MOST likely to obtain approval for a new security project when the business case provides evidence of:
An organization recently updated and published its information security policy and standards. What should the information security manager do NEXT?
Which of the following is MOST helpful in determining an organization's current capacity to mitigate risks?
Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?
Which of the following is the MOST important reason to involve external forensics experts in evidence collection when responding to a major security breach?
Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?
Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?
An organization provides notebook PCs, cable wire locks, smartphone access, and virtual private network (VPN) access to its remote employees. Which of the following is MOST important for the information security manager to ensure?
Which of the following BEST minimizes information security risk in deploying applications to the production environment?
An information security team is investigating an alleged breach of an organization's network. Which of the following would be the BEST single source of evidence to review?
Which of the following is MOST important for the successful implementation of an incident response plan?
An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?
When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?
Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?
An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?
An organization engages a third-party vendor to monitor and support a financial application under scrutiny by regulators. Which of the following controls would MOST effectively manage risk to the organization?
Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?
Which of the following BEST indicates that information security governance and corporate governance are integrated?
The BEST way to report to the board on the effectiveness of the information security program is to present:
Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?
After logging in to a web application, additional authentication is checked at various application points. Which of the following is the PRIMARY reason for such an approach?
Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?
Which of the following BEST supports the incident management process for attacks on an organization's supply chain?
Which of the following should be updated FIRST when aligning the incident response plan with the corporate strategy?
Which of the following would BEST justify spending for a compensating control?
How does an organization PRIMARILY benefit from the creation of an information security steering committee?
During an information security audit, it was determined that IT staff did not follow the established standard when configuring and managing IT systems. Which of the following is the BEST way to prevent future occurrences?
Which of the following is MOST effective in monitoring an organization's existing risk?
An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?
An information security manager is assessing security risk associated with a cloud service provider. Which of the following is the MOST appropriate reference to consult when performing this assessment?
During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?
What should be the GREATEST concern for an information security manager of a large multinational organization when outsourcing data processing to a cloud service provider?
What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
An information security manager learns of a new standard related to an emerging technology the organization wants to implement. Which of the following should the information security manager recommend be done FIRST?
An organization has identified a large volume of old data that appears to be unused. Which of the following should the information
security manager do NEXT?
Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?
An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.
Which of the following should be given immediate focus?
Which of the following is the GREATEST challenge when developing key risk indicators (KRIs)?
Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?
Of the following, who is MOST appropriate to own the risk associated with the failure of a privileged access control?
The MOST important information for influencing management’s support of information security is:
The PRIMARY purpose of implementing information security governance metrics is to:
Which of the following is the MOST important consideration when establishing an organization's information security governance committee?
When implementing a security policy for an organization handling personally identifiable information (Pll); the MOST important objective should be:
Which of the following is MOST important to consider when determining asset valuation?
A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be in the business continuity plan (BCP) to manage this requirement?
Which of the following will BEST facilitate the integration of information security governance into enterprise governance?
When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:
Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?
Which of the following roles is MOST appropriate to determine access rights for specific users of an application?
A Seat a-hosting organization's data center houses servers, appli
BEST approach for developing a physical access control policy for the organization?
Which of the following is the MOST important reason for logging firewall activity?
An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?
Of the following, who should be assigned as the owner of a newly identified risk related to an organization's new payroll system?
A global organization is developing an incident response team. The organization wants to keep headquarters informed of all incidents and wants to be able to present a unified response to widely dispersed events. Which of the following BEST supports these objectives?
When deciding to move to a cloud-based model, the FIRST consideration should be:
While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?
The effectiveness of an information security governance framework will BEST be enhanced if:
Which of the following BEST enables an information security manager to obtain organizational support for the implementation of security controls?
Which of the following BEST demonstrates the added value of an information security program?
When management changes the enterprise business strategy which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?
Which of the following is the MOST important issue in a penetration test?
An employee clicked on a link in a phishing email, triggering a ransomware attack Which of the following should be the information security?
An information security manager has become aware that system administrators are not changing server administrator accounts from the default usernames. A policy has been created and approved by business managers to require these changes. Which of the following should be the information security manager’s FIRST course of action?
Which of the following is the MOST effective way to ensure information security policies are understood?
An organization has purchased an Internet sales company to extend the sales department. The information security manager's FIRST step to ensure the security policy framework encompasses the new business model is to:
Which of the following BEST determines an information asset's classification?
A project team member notifies the information security manager of a potential security risk that has not been included in the risk register. Which of the following should the information security manager do FIRST?
What is the role of the information security manager in finalizing contract negotiations with service providers?
When developing an information security strategy for an organization, which of the following is MOST helpful for understanding where to focus efforts?
An organization is in the process of defining policies for employee use of social media. It is MOST important for the information security manager to:
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?
While responding to a high-profile security incident, an information security manager observed several deficiencies in the current incident response plan. When would be the BEST time to update the plan?
Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?
Which of the following metrics is MOST appropriate for evaluating the incident notification process?
Which of the following would BEST guide the development and maintenance of an information security program?
When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?
Which of the following should be given the HIGHEST priority during an information security post-incident review?
Which of the following BEST facilitates the effective execution of an incident response plan?
Which of the following BEST enables an organization to identify and contain security incidents?
To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:
When remote access is granted to a company's internal network, the MOST important consideration should be that access is provided:
An information security team has confirmed that threat actors are taking advantage of a newly announced critical vulnerability within an application. Which of the following should be done
FIRST?
Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
To support effective risk decision making, which of the following is MOST important to have in place?
Which of the following is the MOST important reason for obtaining input from risk owners when implementing controls?
Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?
What is the BEST way to reduce the impact of a successful ransomware attack?
Which of the following BEST supports effective communication during information security incidents7
Which of the following is the MOST important reason to conduct interviews as part of the business impact analysis (BIA) process?
When assigning a risk owner, the MOST important consideration is to ensure the owner has:
An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?
Which of the following provides the BEST evidence that a newly implemented security awareness program has been effective?
Which of the following has the GREATEST impact on efforts to improve an organization's security posture?
Which of the following is the MOST likely reason for a vulnerability scanner to return incomplete results?
Which of the following is the FIRST step to establishing an effective information security program?
Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?
Which of the following should be the NEXT step after a security incident has been reported?
In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or
Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?
A new application has entered the production environment with deficient technical security controls. Which of the following is MOST Likely the root cause?
The MOST effective tools for responding to new and advanced attacks are those that detect attacks based on:
An incident response team has established that an application has been breached. Which of the following should be done NEXT?
When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:
Which of the following would provide the MOST value to senior management when presenting the results of a risk assessment?
Which of the following BEST ensures information security governance is aligned with corporate governance?
An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:
Which of the following is the MOST effective way to protect the authenticity of data in transit?
Which of the following should be the FIRST step in developing an information security strategy?
An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?
Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?
Which of the following is the MOST important consideration during the design phase of a business impact analysis (BIA)?
An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
Which of the following has the GREATEST influence on the successful integration of information security within the business?
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
The results of a risk assessment for a potential network reconfiguration reveal a high likelihood of sensitive data being compromised. What is the information security manager's BEST course of
action?
Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
Which of the following is the PRIMARY outcome of a business impact analysis (BIA)?
To ensure that a new application complies with information security policy, the BEST approach is to:
Which of the following incident response phases involves actions to help safeguard critical systems while maintaining business operations?
Embedding security responsibilities into job descriptions is important PRIMARILY because it:
ACISO learns that a third-party service provider did not notify the organization of a data breach that affected the service provider's data center. Which of the following should the CISO do FIRST?
Which of the following is MOST important to include in an information security strategy?
During which of the following development phases is it MOST challenging to implement security controls?
An organization has an ongoing security awareness training program. Employee participation has been decreasing over the year, while the number of malware and phishing incidents from email has been increasing. What is the information security manager's BEST course of action?
Which of the following is the GREATEST benefit of information asset classification?
Which of the following metrics BEST demonstrates the effectiveness of an organization's security awareness program?
Which of the following BEST enables an organization to determine what activities and changes have occurred on a system during a cybersecurity incident?
An organization is planning to open a new office in another country. Sensitive data will be routinely sent between the two offices. What should be the information security manager’s FIRST course of action?
An organization's quality process can BEST support security management by providing:
Which is MOST important to identify when developing an effective information security strategy?
Which of the following is MOST important to consider when aligning a security awareness program with the organization's business strategy?
Which of the following is MOST important to have in place as a basis for developing an effective information security program that supports the organization's business goals?
Which of the following should be the PRIMARY focus of a status report on the information security program to senior management?
Which of the following is MOST effective for communicating forward-looking trends within security reporting?
A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?
Which of the following BEST indicates the organizational benefit of an information security solution?
An organization is planning to engage a third-party service provider to develop custom software. Which of the following would help to provide the GREATEST assurance of software security?
To inform a risk treatment decision, which of the following should the information security manager compare with the organization's risk appetite?
Which of the following BEST facilitates the development of a comprehensive information security policy?
When collecting admissible evidence, which of the following is the MOST important requirement?
Which of the following provides the BEST indication of the return on information security investment?
Which of the following should be the FIRST step when performing triage of a malware incident?
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
A global organization is considering its geopolitical security risks. Which of the following is the information security manager's BEST approach?
Which of the following BEST enables the integration of information security governance into corporate governance?
Which of the following BEST enables an organization to maintain an appropriate security control environment?
Management would like to understand the risk associated with engaging an Infrastructure-as-a-Service (laaS) provider compared to hosting internally. Which of the following would provide the BEST method of comparing risk scenarios?
Which of the following MUST be established to maintain an effective information security governance framework?
Which of the following is established during the preparation phase of an incident response plan?
A backdoor has been identified that enabled a cyberattack on an organization’s systems. Integrating which of the following into the software development life cycle would BEST enable the organization to mitigate similar attacks in the future?
Which of the following is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?
Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?
Which of the following is MOST helpful in the development of a cost-effective information security strategy that is aligned with business requirements?
Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its cloud services.
Which of the following should be the PRIMARY focus of Company A's information security manager?
An online trading company discovers that a network attack has penetrated the firewall. What should be the information security manager's FIRST response?
The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:
Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
Which of the following is MOST important to ensuring that incident management plans are executed effectively?
Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?
When developing a categorization method for security incidents, the categories MUST:
Which of the following is MOST important to include in a post-incident review following a data breach?
Which of the following BEST enables an organization to determine the costs of downtime for a critical application?
Which of the following is the MOST effective way to detect information security incidents?
When defining a security baseline, it is MOST important that the baseline:
Which of the following is the BEST indication of an effective information security program?
Which of the following should include contact information for representatives of equipment and software vendors?
Which of the following would BEST enable a new information security manager to assess the current state of information security governance within the organization?
Which risk is introduced when using only sanitized data for the testing of applications?
Which of the following business units should own the data that populates an identity management system?
Which of the following BEST illustrates residual risk within an organization?
Which of the following would BEST address the risk of a system failing to detect a breach?
An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager's FIRST step?
The PRIMARY benefit of integrating information security activities into change management processes is to:
Which of the following BEST helps to ensure a third-party backup site continues to meet the organization’s information security standards?
Which of the following is the BEST course of action when an information security manager identifies that systems are vulnerable to emerging threats?
Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?
Which of the following is the MOST effective way to detect security incidents?
Which of the following is MOST important to consider when defining control objectives?
The use of a business case to obtain funding for an information security investment is MOST effective when the business case:
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?
Of the following, who is BEST suited to own the risk discovered in an application?
The contribution of recovery point objective (RPO) to disaster recovery is to:
Which of the following should be implemented to BEST reduce the likelihood of a security breach?
Which of the following is the PRIMARY benefit of training service desk staff to recognize incidents?
Which of the following is MOST important to the effectiveness of an information security program?
Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?
Which of the following is a PRIMARY benefit of managed security solutions?
An organization is considering using a third party to host sensitive archived data. Which of the following is MOST important to verify before entering into the relationship?
What should an information security manager do FIRST when an organization is planning to use a third-party cloud computing service for a critical business process?
Which of the following is the BEST tool to monitor the effectiveness of information security governance?
An incident management team is alerted ta a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
Which of the following is the GREATEST threat posed by quantum computing technology for information security?
An information security manager developing an incident response plan MUST ensure it includes:
Which of the following BEST demonstrates that an anti-phishing campaign is effective?
An organization's automated security monitoring tool generates an excessively large amount of falsq positives. Which of the following is the BEST method to optimize the monitoring process?
An organization wants to migrate a proprietary application to be hosted by a third-party cloud hosting provider using a Platform as a Service (PaaS) model. Prior to selecting the cloud provider, what is MOST important for the organization to ensure?
Which of the following BEST enables staff acceptance of information security policies?
Which of the following is the MOST important constraint to be considered when developing an information security strategy?
A new regulatory requirement affecting an organization's information security program is released. Which of the following should be the information security manager's FIRST course of action?
Which of the following is the BEST option to lower the cost to implement application security controls?
Which of the following is MOST important in increasing the effectiveness of incident responders?
Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?
Which of the following is a desired outcome of information security governance?
An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?
Which of the following should be an information security manager's FIRST course of action when a potential business breach is discovered in a critical business system?
Which of the following is the GREATEST benefit of using AI tools in security operations?
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?
An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:
• A bad actor broke into a business-critical FTP server by brute forcing an administrative password
• The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
• The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
• After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail
Which of the following could have been prevented by conducting regular incident response testing?
Which of the following is an example of a change to the external threat landscape?
An organization uses a security standard that has undergone a major revision by the certifying authority. The old version of the standard will no longer be used for organizations wishing to maintain their certifications. Which of the following should be the FIRST
course of action?
Which of the following is the MOST essential element of an information security program?
Which of the following sources is MOST useful when planning a business-aligned information security program?
Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?
Which of the following is the MOST effective way to increase security awareness in an organization?
The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:
Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?
Which of the following BEST enables an organization to transform its culture to support information security?
Which of the following is the BEST way to ensure the capability to restore clean data after a ransomware attack?
Which of the following would BEST justify continued investment in an information security program?
A department has reported that a security control is no longer effective. Which of the following is the information security manager's BEST course of action?
A business impact analysis (BIA) BEST enables an organization to establish:
An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?
The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
Which of the following is the BEST strategy when determining an organization’s approach to risk treatment?
Which of the following is the GREATEST benefit of classifying information security incidents?
Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?
Which of the following is the MOST important function of an information security steering committee?
A common drawback of email software packages that provide native encryption of messages is that the encryption:
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
An information security manager has discovered a new technique that cybercriminals are exploiting. Which of the following has the manager identified?