An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?
Which of the following has the GREATEST impact on the effectiveness of an organization’s security posture?
Which of the following is the PRIMARY role of an information security manager in a software development project?
An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
Which of the following is the BEST approach for governing noncompliance with security requirements?
An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.
Which of the following should be given immediate focus?
An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?
Which of the following is MOST important in order to obtain senior leadership support when presenting an information security strategy?
Which of the following BEST minimizes information security risk in deploying applications to the production environment?
Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:
When choosing the best controls to mitigate risk to acceptable levels, the information security manager's decision should be MAINLY driven by:
Which of the following tools would be MOST helpful to an incident response team?
What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?
Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?
Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?
After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?
Which of the following is MOST helpful for determining which information security policies should be implemented by an organization?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
Which of the following should have the MOST influence on an organization's response to a new industry regulation?
Which of the following metrics would BEST demonstrate the success of a newly implemented information security framework?
Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?
Which of the following is MOST important to the effectiveness of an information security steering committee?
An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?
Which of the following should be the MOST important consideration when reviewing an information security strategy?
Which of the following should be the FIRST step when performing triage of a malware incident?
Which of the following is the BEST course of action for an information security manager to align security and business goals?
Which of the following is the MOST effective way to ensure information security policies are understood?
In addition to executive sponsorship and business alignment, which of the following is MOST critical for information security governance?
Which of the following should be the KEY consideration when creating an information security communication plan with industry peers?
An organization has updated its business goals in the middle of the fiscal year to respond to changes in market conditions. Which of the following is MOST important for the information security manager to update in support of the new goals?
Which of the following is the BEST way to determine if an information security profile is aligned with business requirements?
When assigning a risk owner, the MOST important consideration is to ensure the owner has:
An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:
Which of the following analyses will BEST identify the external influences to an organization's information security?
When analyzing the emerging risk and threat landscape, an information security manager should FIRST:
Which of the following is the PRIMARY role of the information security manager in application development?
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
Which of the following defines the triggers within a business continuity plan (BCP)? @
Which of the following is MOST important to have in place when conducting a security control assessment of a system?
A new application has entered the production environment with deficient technical security controls. Which of the following is MOST Likely the root cause?
Which of the following is the MOST important consideration during the design phase of a business impact analysis (BIA)?
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
Which of the following control types should be considered FIRST for aligning employee behavior with an organization's information security objectives?
Which of the following should be the FIRST step in developing an information security strategy?
Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?
Which of the following should be done FIRST when establishing an information security governance framework?
When deciding to move to a cloud-based model, the FIRST consideration should be:
Which of the following is MOST critical when creating an incident response plan?
An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?
Which type of backup BEST enables an organization to recover data after a ransomware attack?
An organization has identified a large volume of old data that appears to be unused. Which of the following should the information
security manager do NEXT?
An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?
Which of the following BEST indicates the organizational benefit of an information security solution?
Which of the following should be of GREATEST concern to an information security manager when evaluating a cloud service provider?
Which of the following is the BEST way to evaluate the effectiveness of physical and environmental security controls implemented for fire-related disasters?
Which of the following is the MOST important criterion when deciding whether to accept residual risk?
An incident handler is preparing a forensic image of a hard drive. Which of the following MUST be done to provide evidence that the image is an exact copy of the original?
Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?
Which of the following is the MOST appropriate metric to demonstrate the effectiveness of information security controls to senior management?
Which of the following is MOST important to include in a post-incident review following a data breach?
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:
Which of the following should be the NEXT step after a security incident has been reported?
A global organization has outsourced security processes to a service provider by means of a global agreement. What is the MOST efficient approach to meet country-specific regulatory requirements?
Which of the following BEST ensures timely and reliable access to services?
Which of the following is the BEST indicator of a successful intrusion into an organization's systems?
An organization has an ongoing security awareness training program. Employee participation has been decreasing over the year, while the number of malware and phishing incidents from email has been increasing. What is the information security manager's BEST course of action?
Which of the following is the BEST indication of effective information security governance?
The BEST way to integrate information security governance with corporate governance is to ensure:
Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?
Which of the following is the PRIMARY responsibility of an information security governance committee?
Which of the following is MOST important to maintain integration among the incident response plan, business continuity plan (BCP). and disaster recovery plan (DRP)?
Which of the following is the BEST tool to monitor the effectiveness of information security governance?
An information security manager has become aware that a third-party provider is not in compliance with the statement of work (SOW). Which of the following is the BEST course of action?
Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?
To help ensure that an information security training program is MOST effective its contents should be
Which of the following is MOST appropriate for an organization to consider when defining incident classification and categorization levels?
The PRIMARY reason to properly classify information assets is to determine:
For an e-business that requires high availability, which of the following design principles is BEST?
Which of the following should be the PRIMARY objective of an information security governance framework?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
Which of the following BEST enables the restoration of operations after a limited ransomware incident occurs?
The categorization of incidents is MOST important for evaluating which of the following?
Which of the following BEST indicates that information assets are classified accurately?
Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?
Which of the following is the MOST essential element of an information security program?
In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
How does an incident response team BEST leverage the results of a business impact analysis (BIA)?
Prior to conducting a forensic examination, an information security manager should:
The contribution of recovery point objective (RPO) to disaster recovery is to:
An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?
When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:
Which of the following is the PRIMARY benefit of training service desk staff to recognize incidents?
Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?
How would the information security program BEST support the adoption of emerging technologies?
Which of the following tasks would provide a newly appointed information security manager with the BEST view of the organization's existing security posture?
Which of the following should be an information security manager's FIRST course of action when a potential business breach is discovered in a critical business system?
Which of the following will ensure confidentiality of content when accessing an email system over the Internet?
Which of the following should be an information security manager s MOST important consideration when determining the priority for implementing security controls?
Which of the following is the MOST important objective when planning an incident response program?
Which of the following is MOST helpful to identify whether information security policies have been followed?
Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?
A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?
Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:
Which of the following is the PRIMARY reason to use a phased incident recovery approach?
A global organization is developing an incident response team. The organization wants to keep headquarters informed of all incidents and wants to be able to present a unified response to widely dispersed events. Which of the following BEST supports these objectives?
Which of the following BEST enables an information security manager to demonstrate the effectiveness of the information security and risk program to senior management?
An information security manager finds that a soon-to-be deployed online application will increase risk beyond acceptable levels, and necessary controls have not been included. Which of the following is the BEST course of action for the information security manager?
An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?
Which of the following BEST determines the allocation of resources during a security incident response?
In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.
Before relying on this certification, it is MOST important that the information security manager confirms that the:
The MOST effective tools for responding to new and advanced attacks are those that detect attacks based on:
Which of the following processes is MOST important for the success of a business continuity plan (BCP)?
Which of the following is MOST important to the successful implementation of an information security program?
A technical vulnerability assessment on a personnel information management server should be performed when:
A Seat a-hosting organization's data center houses servers, appli
BEST approach for developing a physical access control policy for the organization?
An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
Which of the following will BEST facilitate the integration of information security governance into enterprise governance?
Which of the following is the PRIMARY impact of organizational culture on the effectiveness of an information security program?
An organization has decided to implement an Internet of Things (IoT) solution to remain competitive in the market. Which of the following should information security do FIRST?
Which of the following provides the BEST indication of the return on information security investment?
To prepare for a third-party forensics investigation following an incident involving malware, the incident response team should:
Business objectives and organizational risk appetite are MOST useful inputs to the development of information security:
An information security manager learns of a new standard related to an emerging technology the organization wants to implement. Which of the following should the information security manager recommend be done FIRST?
Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?
Which of the following will BEST enable an effective information asset classification process?
Which of the following would BEST support the business case for an increase in the information security budget?
An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?
A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?
Which type of system is MOST effective for monitoring cyber incidents based on impact and tracking them until they are closed?
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
Which of the following BEST facilitates effective incident response testing?
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
Which of the following BEST enables staff acceptance of information security policies?
Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?
Which of the following BEST indicates that an information security governance framework has been successfully implemented?
An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?
Which of the following is the MOST critical factor for information security program success?
During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?
When determining an acceptable risk level which of the following is the MOST important consideration?
Which of the following would BEST justify continued investment in an information security program?
Which of the following is the BEST approach for data owners to use when defining access privileges for users?
Define access privileges based on user roles.
Adopt user account settings recommended by the vendor.
Perform a risk assessment of the users' access privileges.
Which of the following activities is designed to handle a control failure that leads to a breach?
Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?
An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?
Which of the following should be established FIRST when implementing an information security governance framework?
Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?
Which of the following should be the PRIMARY basis for a severity hierarchy for information security incident classification?
A finance department director has decided to outsource the organization's budget application and has identified potential providers. Which of the following actions should be initiated FIRST by IN information security manager?
An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?
Which of the following should be the MOST important consideration of business continuity management?
Which of the following BEST indicates that information security governance and corporate governance are integrated?
An organization wants to migrate a proprietary application to be hosted by a third-party cloud hosting provider using a Platform as a Service (PaaS) model. Prior to selecting the cloud provider, what is MOST important for the organization to ensure?
Which of the following is the GREATEST challenge when developing key risk indicators (KRIs)?
A security incident has been reported within an organization. When should an information security manager contact the information owner?
Which of the following should be done NEXT following senior management's decision to comply with new personal data regulations that are much more stringent than those currently followed to avoid massive fines?
For the information security manager, integrating the various assurance functions of an organization is important PRIMARILY to enable:
An organization that conducts business globally is planning to utilize a third-party service provider to process payroll information. Which of the following issues poses the GREATEST risk to the organization?
How does an organization PRIMARILY benefit from the creation of an information security steering committee?
If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:
Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?
Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?
To improve the efficiency of the development of a new software application, security requirements should be defined:
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
Which of the following is the BEST indication that an organization has a mature information security culture?
Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?
A new information security reporting requirement will soon become effective. Which of the following should be the information security manager's FIRST action?
Which of the following is MOST effective in monitoring an organization's existing risk?
Which of the following BEST determines the data retention strategy and subsequent policy for an organization?
An organization plans to offer clients a new service that is subject to regulations. What should the organization do FIRST when developing a security strategy in support of this new service?
After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?
Which of the following BEST enables an organization to provide ongoing assurance that legal and regulatory compliance requirements can be met?
Which of the following should be done FIRST when establishing a new data protection program that must comply with applicable data privacy regulations?
An organization has acquired a new system with strict maintenance instructions and schedules. Where should this information be documented?
Which of the following is the PRIMARY benefit of implementing an information security governance framework?
Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?
Which of the following is the BEST way lo monitor for advanced persistent threats (APT) in an organization?
Which of the following should be the FIRST step in patch management procedures when receiving an emergency security patch?
When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?
Which risk is introduced when using only sanitized data for the testing of applications?
Which of the following is necessary to ensure consistent protection for an organization's information assets?
Which of the following sources is MOST useful when planning a business-aligned information security program?
Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?
In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:
Which of the following is MOST important to determine following the discovery and eradication of a malware attack?
Which of the following is the GREATEST benefit of classifying information security incidents?
Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?
Which of the following should be done FIRST when a SIEM flags a potential event?
Which of the following is the MOST important factor in an organization's selection of a key risk indicator (KRI)?
The MAIN benefit of implementing a data loss prevention (DLP) solution is to:
An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?
During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
An organization has been penalized by regulatory authorities for failing to notify them of a major security breach that may have compromised customer data. Which of the following is MOST likely in need of review and updating to prevent similar penalties in the future?
Which of the following backup methods requires the MOST time to restore data for an application?
Which of the following is MOST important to consider when determining asset valuation?
To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?
Which of the following BEST enables an organization to maintain an appropriate security control environment?
Which of the following is the MOST effective defense against malicious insiders compromising confidential information?
Which of the following activities is MOST appropriate to conduct during the eradication phase of a cyber incident response?
While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?
Which of the following is the MOST important factor in successfully implementing Zero Trust?
An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?
Which of the following metrics is MOST appropriate for evaluating the incident notification process?
Which of the following metrics would provide an accurate measure of an information security program's performance?
Which of the following is the PRIMARY objective of testing security controls within a critical infrastructure?
Which of the following presents the GREATEST risk associated with the use of an automated security information and event management (SIEM) system?
Which of the following BEST enables an organization to maintain legally admissible evidence7
Which of the following is the MOST important consideration when establishing an organization's information security governance committee?
The BEST way to report to the board on the effectiveness of the information security program is to present:
Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?
Which of the following is MOST important to have in place as a basis for developing an effective information security program that supports the organization's business goals?
Which of the following is the BEST way to compete for funding for an information security program in an organization with limited resources?
Which of the following is the BEST course of action after management has reviewed an identified risk and determines the risk is below the defined risk appetite?
Which of the following is the MOST effective way to detect security incidents?
An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:
An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?
Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
Which of the following business units should own the data that populates an identity management system?
A common drawback of email software packages that provide native encryption of messages is that the encryption:
The PRIMARY objective of a post-incident review of an information security incident is to:
What is the MOST important consideration for an organization operating in a highly regulated market when new regulatory requirements with high impact to the business need to be implemented?
A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?
What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?
Following an employee security awareness training program, what should be the expected outcome?
When developing an asset classification program, which of the following steps should be completed FIRST?
What should be the GREATEST concern for an information security manager of a large multinational organization when outsourcing data processing to a cloud service provider?
Which of the following is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?
Which of the following would provide the MOST value to senior management when presenting the results of a risk assessment?
Which of the following BEST protects against emerging advanced persistent threat (APT) actors?
An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?
Which of the following is MOST important to ensuring that incident management plans are executed effectively?
A data loss prevention (DLP) tool has flagged personally identifiable information (Pll) during transmission. Which of the following should the information security manager do FIRST?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
What should be the FIRST step when implementing data loss prevention (DLP) technology?
Which of the following should be considered FIRST when recovering a compromised system that needs a complete rebuild?
Which of the following is MOST important for the improvement of a business continuity plan (BCP)?
Which of the following should have the MOST influence on the development of information security policies?
During which phase of an incident response plan is the root cause determined?
Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?
Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?
Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?
Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?
Which of the following is a function of the information security steering committee?
Which of the following provides an information security manager with the MOST accurate indication of the organization's ability to respond to a cyber attack?
Which of the following BEST enables an information security manager to obtain organizational support for the implementation of security controls?
The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:
Which of the following is MOST helpful in determining the criticality of an organization's business functions?
Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?
Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?
A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?
Who is BEST suited to determine how the information in a database should be classified?
An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager's FIRST step?
Which of the following is MOST important for an information security manager to consider when developing a business continuity plan (BCP) for ransomware attacks?
Which of the following is the MOST effective way to demonstrate alignment of information security strategy with business objectives?
To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:
The PRIMARY consideration when responding to a ransomware attack should be to ensure:
Which of the following is MOST important for building 4 robust information security culture within an organization?
Threat and vulnerability assessments are important PRIMARILY because they are:
Which of the following is the MOST important consideration when updating procedures for managing security devices?
Which of the following is an information security manager's MOST important course of action when responding to a major security incident that could disrupt the business?
After the occurrence of a major information security incident, which of the following will BEST help an information security manager determine corrective actions?
Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?
Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?