A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?
Which risk is introduced when using only sanitized data for the testing of applications?
Which of the following is the GREATEST benefit of information asset classification?
Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?
Which of the following BEST enables the restoration of operations after a limited ransomware incident occurs?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
Which of the following is the GREATEST inherent risk when performing a disaster recovery plan (DRP) test?
An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?
A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.
Which of the following should be given immediate focus?
Which of the following is MOST important for the successful implementation of an incident response plan?
Which of the following should be the FIRST step when performing triage of a malware incident?
An organization's information security manager reads on social media that a recently purchased vendor product has been compromised and customer data has been posted online. What should the information security manager do FIRST?
Which of the following is MOST important to the successful implementation of an information security program?
An information security manager has been notified that two senior executives have the ability to elevate their own privileges in the corporate accounting system, in violation of policy. What is the FIRST step to address this issue?
Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?
Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?
Which of the following parties should be responsible for determining access levels to an application that processes client information?
Which of the following is the BEST indicator of an organization's information security status?
Which of the following is MOST important for an information security manager to verify when selecting a third-party forensics provider?
From an information security perspective, legal issues associated with a transborder flow of technology-related items are MOST often
Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?
Which of the following is the PRIMARY reason to use a phased incident recovery approach?
Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its cloud services.
Which of the following should be the PRIMARY focus of Company A's information security manager?
The information security manager of a multinational organization has been asked to consolidate the information security policies of its regional locations. Which of the following would be of
GREATEST concern?
During which of the following development phases is it MOST challenging to implement security controls?
Which of the following BEST enables an organization to effectively manage emerging cyber risk?
Which of the following is the MOST essential element of an information security program?
Which of the following is the MOST important factor of a successful information security program?
An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?
Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?
After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?
The PRIMARY reason to properly classify information assets is to determine:
Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?
Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?
Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:
When determining an acceptable risk level which of the following is the MOST important consideration?
Of the following, who is accountable for data loss in the event of an information security incident at a third-party provider?
Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?
Which of the following is MOST important to ensuring that incident management plans are executed effectively?
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?
Which of the following is the MOST effective way to detect security incidents?
To prepare for a third-party forensics investigation following an incident involving malware, the incident response team should:
Which of the following is MOST important to include in an information security strategy?
Which of the following BEST facilitates effective strategic alignment of security initiatives?
Which of the following provides the MOST useful information for identifying security control gaps on an application server?
Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?
Which of the following is MOST important when developing an information security strategy?
Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of
confidentiality?
Which of the following BEST indicates that an information security governance framework has been successfully implemented?
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
An organization is performing due diligence when selecting a third party. Which of the following is MOST helpful to reduce the risk of unauthorized sharing of information during this process?
Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?
Which of the following control types should be considered FIRST for aligning employee behavior with an organization's information security objectives?
Which of the following should an information security manager do FIRST upon learning that a competitor has experienced a ransomware attack?
An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?
Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?
When properly implemented, secure transmission protocols protect transactions:
Which of the following BEST facilitates an information security manager's efforts to obtain senior management commitment for an information security program?
Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?
Which of the following is the BEST way to ensure data is not co-mingled or exposed when using a cloud service provider?
Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?
Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?
During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?
Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?
Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?
What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?
Which of the following is MOST important for the effective implementation of an information security governance program?
Which of the following provides the BEST evidence that a recently established infofmation security program is effective?
Which of the following BEST indicates that information security governance and corporate governance are integrated?
Which of the following is MOST helpful in determining an organization's current capacity to mitigate risks?
An organization engages a third-party vendor to monitor and support a financial application under scrutiny by regulators. Which of the following controls would MOST effectively manage risk to the organization?
Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
Implementing the principle of least privilege PRIMARILY requires the identification of:
Which of the following BEST illustrates residual risk within an organization?
Senior management wants to thoroughly test a disaster recovery plan (DRP) for a mission-critical system. Which of the following would provide the MOST reliable results?
Which of the following is the BEST way to address data availability concerns when outsourcing information security administration?
The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness training program is to include:
Which of the following is the PRIMARY role of the information security manager in application development?
Which of the following is MOST important for building 4 robust information security culture within an organization?
An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?
Which of the following BEST demonstrates the added value of an information security program?
The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?
An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?
When developing an asset classification program, which of the following steps should be completed FIRST?
Which of the following should be considered FIRST when recovering a compromised system that needs a complete rebuild?
Of the following, who should be assigned as the owner of a newly identified risk related to an organization's new payroll system?
An organization has determined that fixing a security vulnerability in a critical application is too costly to be feasible, but the impact is material to the business. Which of the following is the MOST appropriate risk treatment?
When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?
For the information security manager, integrating the various assurance functions of an organization is important PRIMARILY to enable:
Which of the following presents the GREATEST challenge to a large multinational organization using an automated identity and access management (1AM) system?
Who is BEST suited to determine how the information in a database should be classified?
Which of the following should be done FIRST when establishing an information security governance framework?
Which of the following is the PRIMARY objective of a cyber resilience strategy?
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
An organization is leveraging tablets to replace desktop computers shared by shift-based staff These tablets contain critical business data and are inherently at increased risk of theft Which of the following will BEST help to mitigate this risk''
Which of the following will BEST facilitate timely and effective incident response?
Which of the following is the BEST course of action when an online company discovers a network attack in progress?
Which of the following is the BEST approach for governing noncompliance with security requirements?
Which of the following should be done FIRST when a SIEM flags a potential event?
Which of the following is the PRIMARY benefit of an information security awareness training program?
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
Which of the following BEST enables an organization to maintain an appropriate security control environment?
An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?
A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:
Which of the following is MOST important when designing security controls for new cloud-based services?
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
A new risk has been identified in a high availability system. The BEST course of action is to:
A new application has entered the production environment with deficient technical security controls. Which of the following is MOST Likely the root cause?
Which of the following is the BEST way to determine the gap between the present and desired state of an information security program?
Which of the following is the BEST indication that an organization has integrated information security governance with corporate governance?
Which of the following would BEST justify continued investment in an information security program?
An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?
Which of the following is the BEST indication of information security strategy alignment with the “&
An organization provides notebook PCs, cable wire locks, smartphone access, and virtual private network (VPN) access to its remote employees. Which of the following is MOST important for the information security manager to ensure?
Which of the following metrics would provide an accurate measure of an information security program's performance?
Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?
Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?
Which of the following is the MOST common cause of cybersecurity breaches?
A global organization has outsourced security processes to a service provider by means of a global agreement. What is the MOST efficient approach to meet country-specific regulatory requirements?
Which of the following is the MOST important reason to consider organizational culture when developing an information security program?
Which of the following is the BEST way to ensure the capability to restore clean data after a ransomware attack?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
Which of the following is MOST important to have in place when conducting a security control assessment of a system?
An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?
Which of the following is the MOST appropriate risk response when the risk impact has been determined to be immaterial and the likelihood is very low?
In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?
Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?
An incident handler is preparing a forensic image of a hard drive. Which of the following MUST be done to provide evidence that the image is an exact copy of the original?
Which of the following business units should own the data that populates an identity management system?
Which of the following is MOST critical when creating an incident response plan?
To inform a risk treatment decision, which of the following should the information security manager compare with the organization's risk appetite?
When establishing metrics for an information security program, the BEST approach is to identify indicators that:
Which of the following is MOST important when designing an information security governance framework?
The MAIN benefit of implementing a data loss prevention (DLP) solution is to:
Which of the following BEST supports the incident management process for attacks on an organization's supply chain?
An organization has just updated its backup capability to a new cloud-based solution. Which of the following tests will MOST effectively verify this change is working as intended?
Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?
Which of the following should be done FIRST when implementing a security program?
Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?
A multinational organization is introducing a security governance framework. The information security manager's concern is that regional security practices differ. Which of the following should be evaluated FIRST?
A business impact analysis (BIA) BEST enables an organization to establish:
Which is following should be an information security manager's PRIMARY focus during the development of a critical system storing highly confidential data?
A new information security manager finds that the organization tends to use short-term solutions to address problems. Resource allocation and spending are not effectively tracked, and there is no assurance that compliance requirements are being met. What should be done FIRST to reverse this bottom-up approach to security?
An online trading company discovers that a network attack has penetrated the firewall. What should be the information security manager's FIRST response?
Which of the following BEST demonstrates that an anti-phishing campaign is effective?
A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?
Which of the following is the PRIMARY objective of information asset classification?
Which of the following is the BEST reason to implement an information security architecture?
Which of the following is the PRIMARY reason to assign a risk owner in an organization?
Which of the following is the BEST way to obtain organization-wide support for an information security program?
Which of the following BEST facilitates the development of a comprehensive information security policy?
An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:
What is the PRIMARY benefit to an organization when information security program requirements are aligned with employment and staffing processes?
Which of the following is the BEST indication ofa successful information security culture?
Which of the following should be done FIRST when establishing a new data protection program that must comply with applicable data privacy regulations?
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
Who is accountable for approving an information security governance framework?
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
Which of the following is the MOST effective way to determine the alignment of an information security program with the business strategy?
Which type of backup BEST enables an organization to recover data after a ransomware attack?
Which of the following should an information security manager do FIRST when a vulnerability has been disclosed?
Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?
Which of the following is MOST important to consider when defining control objectives?
An organization has identified a weakness in the ability of its employees to identify and report cybersecurity incidents. Although training materials have been provided, employees show a lack of interest. Which of the following is the information security manager’s BEST course of action?
Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?
An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?
In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:
The MOST important element in achieving executive commitment to an information security governance program is:
Which of the following is MOST helpful to identify whether information security policies have been followed?
To support effective risk decision making, which of the following is MOST important to have in place?
An organization experienced a loss of revenue during a recent disaster. Which of the following would BEST prepare the organization to recover?
An information security manager learns of a new standard related to an emerging technology the organization wants to implement. Which of the following should the information security manager recommend be done FIRST?
Of the following, who is in the BEST position to evaluate business impacts?
Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?
Which of the following has the GREATEST impact on efforts to improve an organization's security posture?
Which of the following MUST happen immediately following the identification of a malware incident?
Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
An organization is considering the feasibility of implementing a big data solution to analyze customer data. In order to support this initiative, the information security manager should FIRST:
Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?
Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?
An organization permits the storage and use of its critical and sensitive information on employee-owned smartphones. Which of the following is the BEST security control?
Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?
An organization is increasingly using Software as a Service (SaaS) to replace in-house hosting and support of IT applications. Which of the following would be the MOST effective way to help ensure procurement decisions consider information security concerns?
Which of the following will BEST facilitate the integration of information security governance into enterprise governance?
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?
Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?
Which of the following is MOST useful to an information security manager when determining the need to escalate an incident to senior?
Which of the following is the MOST effective way to ensure information security policies are understood?
Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?
Which of the following is the BEST way to determine if an information security profile is aligned with business requirements?
When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?
Which of the following is the MOST important reason to involve external forensics experts in evidence collection when responding to a major security breach?
If the investigation of an incident is not completed within the time allocated in the incident response plan, which of the following actions should be taken by the incident response team?
Several months after the installation of a new firewall with intrusion prevention features to block malicious activity, a breach was discovered that came in through the firewall shortly after installation. This breach could have been detected earlier by implementing firewall:
An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?
Which of the following metrics would BEST demonstrate the success of a newly implemented information security framework?
Which of the following is the BEST option to lower the cost to implement application security controls?
Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?
Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?
Which of the following should be the PRIMARY goal of information security?
An organization has identified a large volume of old data that appears to be unused. Which of the following should the information
security manager do NEXT?
The PRIMARY reason for creating a business case when proposing an information security project is to:
IT projects have gone over budget with too many security controls being added post-production. Which of the following would MOST help to ensure that relevant controls are applied to a project?
An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?
Which of the following is the PRIMARY responsibility of an information security governance committee?
Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?
In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or
Which of the following should be the NEXT step after a security incident has been reported?
Which of the following has the GREATEST influence on the successful integration of information security within the business?
Which of the following is the BEST indication of a mature information security program?
Which of the following is an information security manager's MOST important course of action after receiving information about a new cybersecurity threat?
When is the BEST time to verify that a production system's security mechanisms meet control objectives?
Which of the following should be the PRIMARY consideration when developing an incident response plan?
A project team member notifies the information security manager of a potential security risk that has not been included in the risk register. Which of the following should the information security manager do FIRST?
Which of the following should have the MOST influence on the development of information security policies?
An employee clicked on a link in a phishing email, triggering a ransomware attack Which of the following should be the information security?
A financial institution is planning to develop a new mobile application. Which of the following is the BEST time to begin assessments of the application's security compliance?
Which of the following is the MOST effective way to convey information security responsibilities across an organization?
While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?
A penetration test against an organization's external web application shows several vulnerabilities. Which of the following presents the GREATEST concern?
When investigating an information security incident, details of the incident should be shared:
Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?
Which of the following should be the FIRST step in patch management procedures when receiving an emergency security patch?
To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:
An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?
Which of the following is a function of the information security steering committee?
Which of the following roles is BEST able to influence the security culture within an organization?
An organization recently updated and published its information security policy and standards. What should the information security manager do NEXT?
Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?
When analyzing the emerging risk and threat landscape, an information security manager should FIRST:
The executive management of a domestic organization has announced plans to expand operations to multiple international locations. Which of the following should be the information security manager's FIRST step upon learning of these plans?
An organization is experiencing a sharp increase in incidents related to phishing messages. The root cause is an outdated email filtering system that is no longer supported by the vendor. Which of the following should be the information security manager's FIRST course of action?
Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?
An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?
An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?
Which of the following is the MOST important reason to conduct interviews as part of the business impact analysis (BIA) process?
A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?
Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?
Which of the following is MOST important for the improvement of a business continuity plan (BCP)?
An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:
An internal audit has revealed that a number of information assets have been inappropriately classified. To correct the classifications, the remediation accountability should be assigned to:
An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:
Which of the following is MOST appropriate for an organization to consider when defining incident classification and categorization levels?
The BEST way to report to the board on the effectiveness of the information security program is to present:
Which of the following roles has the PRIMARY responsibility to ensure the operating effectiveness of IT controls?