Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CISM Questions and Answers

Question # 6

An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?

A.

No owners were identified for some risks.

B.

Business applications had the highest number of risks.

C.

Risk mitigation action plans had no timelines.

D.

Risk mitigation action plan milestones were delayed.

Full Access
Question # 7

Which of the following has the GREATEST impact on the effectiveness of an organization’s security posture?

A.

Incident metrics are frequently compared against industry benchmarks

B.

New hires are mandated to attend security training

C.

Security is embedded in organizational culture

D.

Senior management has approved and endorsed security practices

Full Access
Question # 8

Which of the following is the PRIMARY role of an information security manager in a software development project?

A.

To enhance awareness for secure software design

B.

To assess and approve the security application architecture

C.

To identify noncompliance in the early design stage

D.

To identify software security weaknesses

Full Access
Question # 9

An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:

A.

the chief risk officer (CRO).

B.

business senior management.

C.

the information security manager.

D.

the compliance officer.

Full Access
Question # 10

Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:

A.

quickly resolved and eliminated regardless of cost.

B.

tracked and reported on until their final resolution.

C.

documented in security awareness programs.

D.

noted and re-examined later if similar weaknesses are found.

Full Access
Question # 11

Which of the following is the BEST approach for governing noncompliance with security requirements?

A.

Base mandatory review and exception approvals on residual risk,

B.

Require users to acknowledge the acceptable use policy.

C.

Require the steering committee to review exception requests.

D.

Base mandatory review and exception approvals on inherent risk.

Full Access
Question # 12

An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.

Which of the following should be given immediate focus?

A.

Moving to a zero trust access model

B.

Enabling network-level authentication

C.

Enhancing cyber response capability

D.

Strengthening endpoint security

Full Access
Question # 13

An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?

A.

Local regulations

B.

Data backup strategy

C.

Consistency in awareness programs

D.

Organizational reporting structure

Full Access
Question # 14

Which of the following is MOST important in order to obtain senior leadership support when presenting an information security strategy?

A.

The strategy aligns with management’s acceptable level of risk.

B.

The strategy addresses ineffective information security controls.

C.

The strategy aligns with industry benchmarks and standards.

D.

The strategy addresses organizational maturity and the threat environment.

Full Access
Question # 15

Which of the following BEST minimizes information security risk in deploying applications to the production environment?

A.

Integrating security controls in each phase of the life cycle

B.

Conducting penetration testing post implementation

C.

Having a well-defined change process

D.

Verifying security during the testing process

Full Access
Question # 16

Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:

A.

a function of the likelihood and impact, should a threat exploit a vulnerability.

B.

the magnitude of the impact, should a threat exploit a vulnerability.

C.

a function of the cost and effectiveness of controls over a vulnerability.

D.

the likelihood of a given threat attempting to exploit a vulnerability

Full Access
Question # 17

When choosing the best controls to mitigate risk to acceptable levels, the information security manager's decision should be MAINLY driven by:

A.

best practices.

B.

control framework

C.

regulatory requirements.

D.

cost-benefit analysis,

Full Access
Question # 18

Which of the following tools would be MOST helpful to an incident response team?

A.

Intrusion detection system (IDS)

B.

Endpoint detection and response (EDR) solution

C.

User and entity behavior analytics

D.

Vulnerability scanning tools

Full Access
Question # 19

What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?

A.

Report the noncompliance to senior management.

B.

Assess the risk of noncompliance.

C.

Activate the incident response plan.

D.

Evaluate possible compensating controls.

Full Access
Question # 20

Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?

A.

Conduct a business impact analysis (BIA).

B.

Conduct periodic awareness training.

C.

Perform a security gap analysis.

D.

Perform network penetration testing.

Full Access
Question # 21

Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?

A.

Program metrics

B.

Key risk indicators (KRIs)

C.

Risk register

D.

Security strategy

Full Access
Question # 22

After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:

A.

determine the potential impact.

B.

reevaluate the standards.

C.

implement compensating controls.

D.

evaluate the cost of replacing the applications.

Full Access
Question # 23

Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?

A.

Host patching

B.

Penetration testing

C.

Infrastructure hardening

D.

Data classification

Full Access
Question # 24

Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?

A.

Performing penetration tests against the network to demonstrate business vulnerability

B.

Highlighting competitor performance regarding network best security practices

C.

Demonstrating that targeted security controls tie to business objectives

D.

Presenting comparable security implementation estimates from several vendors

Full Access
Question # 25

Which of the following is MOST helpful for determining which information security policies should be implemented by an organization?

A.

Risk assessment

B.

Business impact analysis (BIA)

C.

Vulnerability assessment

D.

Industry best practices

Full Access
Question # 26

During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:

A.

perform a risk assessment.

B.

review the state of security awareness.

C.

review information security policies.

D.

perform a gap analysis.

Full Access
Question # 27

Which of the following should have the MOST influence on an organization's response to a new industry regulation?

A.

The organization's control objectives

B.

The organization's risk management framework

C.

The organization's risk appetite

D.

The organization's risk control baselines

Full Access
Question # 28

Which of the following metrics would BEST demonstrate the success of a newly implemented information security framework?

A.

An increase in the number of identified security incidents

B.

A decrease in the number of security audit findings

C.

A decrease in the number of security policy exceptions

D.

An increase in the number of compliant business processes

Full Access
Question # 29

Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?

A.

Enhanced data governance

B.

Increased third-party assurance

C.

)Improved incident management

D.

Reduced total cost of ownership (TCO)

Full Access
Question # 30

Which of the following is MOST important to the effectiveness of an information security steering committee?

A.

The committee has strong regulatory knowledge.

B.

The committee is comprised of representatives from senior management.

C.

The committee has cross-organizational representation.

D.

The committee uses a risk management framework.

Full Access
Question # 31

An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?

A.

Allow the practice to continue temporarily for monitoring purposes.

B.

Disable the employees' remote access to company email and data

C.

Initiate remote wipe of the devices

D.

Assess the business need to provide a secure solution

Full Access
Question # 32

Which of the following should be the MOST important consideration when reviewing an information security strategy?

A.

Recent security incidents

B.

New business initiatives

C.

Industry security standards

D.

Internal audit findings

Full Access
Question # 33

Which of the following should be the FIRST step when performing triage of a malware incident?

A.

Containing the affected system

B.

Preserving the forensic image

C.

Comparing backup against production

D.

Removing the malware

Full Access
Question # 34

Which of the following is the BEST course of action for an information security manager to align security and business goals?

A.

Conducting a business impact analysis (BIA)

B.

Reviewing the business strategy

C.

Defining key performance indicators (KPIs)

D.

Actively engaging with stakeholders

Full Access
Question # 35

Which of the following is the MOST effective way to ensure information security policies are understood?

A.

Implement a whistle-blower program.

B.

Provide regular security awareness training.

C.

Include security responsibilities in job descriptions.

D.

Document security procedures.

Full Access
Question # 36

A recovery point objective (RPO) is required in which of the following?

A.

Disaster recovery plan (DRP)

B.

Information security plan

C.

Incident response plan

D.

Business continuity plan (BCP)

Full Access
Question # 37

In addition to executive sponsorship and business alignment, which of the following is MOST critical for information security governance?

A.

Ownership of security

B.

Compliance with policies

C.

Auditability of systems

D.

Allocation of training resources

Full Access
Question # 38

Penetration testing is MOST appropriate when a:

A.

new system is about to go live.

B.

new system is being designed.

C.

security policy is being developed.

D.

security incident has occurred,

Full Access
Question # 39

Which of the following should be the KEY consideration when creating an information security communication plan with industry peers?

A.

Balancing the benefits of information sharing with the drawbacks of sharing sensitive information

B.

Reducing the costs associated with information sharing by automating the process

C.

Ensuring information is detailed enough to be of use to other organizations

D.

Notifying the legal department whenever incident-related information is shared

Full Access
Question # 40

An organization has updated its business goals in the middle of the fiscal year to respond to changes in market conditions. Which of the following is MOST important for the information security manager to update in support of the new goals?

A.

Information security threat profile

B.

Information security policy

C.

Information security objectives

D.

Information security strategy

Full Access
Question # 41

Which of the following is the BEST way to determine if an information security profile is aligned with business requirements?

A.

Review the key performance indicator (KPI) dashboard

B.

Review security-related key risk indicators (KRIs)

C.

Review control self-assessment (CSA) results

D.

Review periodic security audits

Full Access
Question # 42

When assigning a risk owner, the MOST important consideration is to ensure the owner has:

A.

adequate knowledge of risk treatment and related control activities.

B.

decision-making authority and the ability to allocate resources for risk.

C.

sufficient time for monitoring and managing the risk effectively.

D.

risk communication and reporting skills to enable decision-making.

Full Access
Question # 43

An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:

A.

disable the user's access to corporate resources.

B.

terminate the device connectivity.

C.

remotely wipe the device

D.

escalate to the user's management

Full Access
Question # 44

Which of the following analyses will BEST identify the external influences to an organization's information security?

A.

Business impact analysis (BIA)

B.

Gap analysis

C.

Threat analysis

D.

Vulnerability analysis

Full Access
Question # 45

When analyzing the emerging risk and threat landscape, an information security manager should FIRST:

A.

determine the impact if threats materialize.

B.

determine the sources of emerging threats.

C.

review historical threats within the industry.

D.

map threats to business assets.

Full Access
Question # 46

Which of the following is the PRIMARY role of the information security manager in application development?

A.

To ensure security is integrated into the system development life cycle (SDLC)

B.

To ensure compliance with industry best practice

C.

To ensure enterprise security controls are implemented

D.

To ensure control procedures address business risk

Full Access
Question # 47

Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?

A.

Threat management is enhanced.

B.

Compliance status is improved.

C.

Security metrics are enhanced.

D.

Proactive risk management is facilitated.

Full Access
Question # 48

Which of the following defines the triggers within a business continuity plan (BCP)? @

A.

Needs of the organization

B.

Disaster recovery plan (DRP)

C.

Information security policy

D.

Gap analysis

Full Access
Question # 49

Which of the following is MOST important to have in place when conducting a security control assessment of a system?

A.

Control specifications

B.

Assurance test plan

C.

Scanning tools

D.

Security documentation

Full Access
Question # 50

A new application has entered the production environment with deficient technical security controls. Which of the following is MOST Likely the root cause?

A.

Inadequate incident response controls

B.

Lack of legal review

C.

Inadequate change control

D.

Lack of quality control

Full Access
Question # 51

Which of the following is the MOST important consideration during the design phase of a business impact analysis (BIA)?

A.

Selecting quality metrics to monitor business performance

B.

Estimating the likelihood that end-to-end processes will be disrupted

C.

Obtaining reserve funding to prepare for possible business failures

D.

Identifying critical functions for business operations

Full Access
Question # 52

Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?

A.

Revise the procurement process.

B.

Update the change management process.

C.

Discuss the issue with senior leadership.

D.

Remove the application from production.

Full Access
Question # 53

Which of the following control types should be considered FIRST for aligning employee behavior with an organization's information security objectives?

A.

Administrative security controls

B.

Technical security controls

C.

Physical security controls

D.

Access security controls

Full Access
Question # 54

Which of the following should be the FIRST step in developing an information security strategy?

A.

Perform a gap analysis based on the current state

B.

Create a roadmap to identify security baselines and controls.

C.

Identify key stakeholders to champion information security.

D.

Determine acceptable levels of information security risk.

Full Access
Question # 55

Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?

A.

Projected Increase in maturity level

B.

Estimated reduction in risk

C.

Projected costs over time

D.

Estimated increase in efficiency

Full Access
Question # 56

Which of the following should be done FIRST when establishing an information security governance framework?

A.

Evaluate information security tools and skills relevant for the environment.

B.

Gain an understanding of the business and cultural attributes.

C.

Contract a third party to conduct an independent review of the program.

D.

Conduct a cost-benefit analysis of the framework.

Full Access
Question # 57

When deciding to move to a cloud-based model, the FIRST consideration should be:

A.

storage in a shared environment.

B.

availability of the data.

C.

data classification.

D.

physical location of the data.

Full Access
Question # 58

Which of the following is the BEST way to prevent insider threats?

A.

Enforce separation of duties and least privilege access.

B.

Conduct organization-wide security awareness training.

C.

Implement logging for all access activities.

D.

Implement strict security policies and password controls.

Full Access
Question # 59

Which of the following is MOST critical when creating an incident response plan?

A.

Identifying vulnerable data assets

B.

Identifying what constitutes an incident

C.

Documenting incident notification and escalation processes

D.

Aligning with the risk assessment process

Full Access
Question # 60

An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?

A.

Internal IT audit

B.

The data custodian

C.

The information security manager

D.

The data owner

Full Access
Question # 61

Which type of backup BEST enables an organization to recover data after a ransomware attack?

A.

Online backup

B.

Incremental backup

C.

Differential backup

D.

Offline backup

Full Access
Question # 62

An organization has identified a large volume of old data that appears to be unused. Which of the following should the information

security manager do NEXT?

A.

Consult the record retention policy.

B.

Update the awareness and training program.

C.

Implement media sanitization procedures.

D.

Consult the backup and recovery policy.

Full Access
Question # 63

An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?

A.

Risk levels may be elevated beyond acceptable limits.

B.

Security audits may report more high-risk findings.

C.

The compensating controls may not be cost efficient.

D.

Noncompliance with industry best practices may result.

Full Access
Question # 64

Which of the following BEST indicates the organizational benefit of an information security solution?

A.

Cost savings the solution brings to the information security department

B.

Reduced security training requirements

C.

Alignment to security threats and risks

D.

Costs and benefits of the solution calculated over time

Full Access
Question # 65

Which of the following should be of GREATEST concern to an information security manager when evaluating a cloud service provider?

A.

Data retention policies are not documented

B.

There is no right to audit the security of the provider

C.

The provider is new to the market and lacks references

D.

Security controls offered by the provider are inadequate

Full Access
Question # 66

Which of the following is the BEST way to evaluate the effectiveness of physical and environmental security controls implemented for fire-related disasters?

A.

Conduct evacuation exercises

B.

Review the disaster recovery plan (DRP)

C.

Conduct awareness sessions

D.

Review emergency management team procedures

Full Access
Question # 67

Which of the following is the MOST important criterion when deciding whether to accept residual risk?

A.

Cost of replacing the asset

B.

Cost of additional mitigation

C.

Annual loss expectancy (ALE)

D.

Annual rate of occurrence

Full Access
Question # 68

An incident handler is preparing a forensic image of a hard drive. Which of the following MUST be done to provide evidence that the image is an exact copy of the original?

A.

Perform a manual verification of file counts.

B.

Encrypt and back up the hard drive before copying.

C.

Use the same hardware for the image as the original.

D.

Perform digital hashing of the original and the image.

Full Access
Question # 69

Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?

A.

Defining information stewardship roles

B.

Defining security asset categorization

C.

Assigning information asset ownership

D.

Developing a records retention schedule

Full Access
Question # 70

Which of the following is the MOST appropriate metric to demonstrate the effectiveness of information security controls to senior management?

A.

Downtime due to malware infections

B.

Number of security vulnerabilities uncovered with network scans

C.

Percentage of servers patched

D.

Annualized loss resulting from security incidents

Full Access
Question # 71

Which of the following risk responses is an example of risk transfer?

A.

Purchasing cybersecurity insurance

B.

Moving risk ownership to another department

C.

Conducting off-site backups

D.

Utilizing third-party applications

Full Access
Question # 72

Which of the following is MOST important to include in a post-incident review following a data breach?

A.

An evaluation of the effectiveness of the information security strategy

B.

Evaluations of the adequacy of existing controls

C.

Documentation of regulatory reporting requirements

D.

A review of the forensics chain of custom

Full Access
Question # 73

An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?

A.

Responsible entities

B.

Key risk indicators (KRIS)

C.

Compensating controls

D.

Potential business impact

Full Access
Question # 74

A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:

A.

developing a security program that meets global and regional requirements.

B.

ensuring effective communication with local regulatory bodies.

C.

using industry best practice to meet local legal regulatory requirements.

D.

monitoring compliance with defined security policies and standards.

Full Access
Question # 75

Which of the following should be the NEXT step after a security incident has been reported?

A.

Recovery

B.

Investigation

C.

Escalation

D.

Containment

Full Access
Question # 76

A global organization has outsourced security processes to a service provider by means of a global agreement. What is the MOST efficient approach to meet country-specific regulatory requirements?

A.

Include binding corporate rules into the global agreement

B.

Set up a governance organization for each country

C.

Review the agreement for each country separately

D.

Set up companion agreements for each country

Full Access
Question # 77

Which of the following BEST ensures timely and reliable access to services?

A.

Nonrepudiation

B.

Authenticity

C.

Availability

D.

Recovery time objective (RTO)

Full Access
Question # 78

Which of the following is the BEST indicator of a successful intrusion into an organization's systems?

A.

Decrease in internal network traffic

B.

Increase in the number of failed login attempts

C.

Increase in the number of irregular application requests

D.

Decrease in available storage space

Full Access
Question # 79

An organization has an ongoing security awareness training program. Employee participation has been decreasing over the year, while the number of malware and phishing incidents from email has been increasing. What is the information security manager's BEST course of action?

A.

Report the findings to senior management with recommendations.

B.

Implement a phishing reporting tool in the email system.

C.

Include regular phishing campaigns after each training session.

D.

Make the training program mandatory for all employees.

Full Access
Question # 80

Which of the following is the BEST indication of effective information security governance?

A.

Information security is considered the responsibility of the entire information security team.

B.

Information security controls are assigned to risk owners.

C.

Information security is integrated into corporate governance.

D.

Information security governance is based on an external security framework.

Full Access
Question # 81

The BEST way to integrate information security governance with corporate governance is to ensure:

A.

the information security steering committee monitors compliance with security policies.

B.

management teams embed information security into business processes.

C.

awareness programs include industry best practice for information security governance.

D.

the information security program is included in regular external audits.

Full Access
Question # 82

Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?

A.

Security policy

B.

Risk management framework

C.

Risk appetite

D.

Security standards

Full Access
Question # 83

Which of the following is the PRIMARY responsibility of an information security governance committee?

A.

Discussing upcoming information security projects

B.

Reviewing the information security risk register

C.

Approving changes to the information security strategy

D.

Reviewing monthly information security metrics

Full Access
Question # 84

Which of the following is MOST important to maintain integration among the incident response plan, business continuity plan (BCP). and disaster recovery plan (DRP)?

A.

Asset classification

B.

Recovery time objectives (RTOs)

C.

Chain of custody

D.

Escalation procedures

Full Access
Question # 85

Which of the following is the BEST tool to monitor the effectiveness of information security governance?

A.

Key performance indicators (KPIs)

B.

Balanced scorecard

C.

Business impact analysis (BIA)

D.

Risk profile

Full Access
Question # 86

An information security manager has become aware that a third-party provider is not in compliance with the statement of work (SOW). Which of the following is the BEST course of action?

A.

Notify senior management of the issue.

B.

Report the issue to legal personnel.

C.

Initiate contract renegotiation.

D.

Assess the extent of the issue.

Full Access
Question # 87

Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?

A.

Record and close security incident tickets.

B.

Test and verify that compromisedsystems are clean.

C.

Document recovery steps for senior management reporting.

D.

Capture and preserve forensic images of affected systems.

Full Access
Question # 88

To help ensure that an information security training program is MOST effective its contents should be

A.

focused on information security policy.

B.

aligned to business processes

C.

based on employees' roles

D.

based on recent incidents

Full Access
Question # 89

Which of the following is MOST appropriate for an organization to consider when defining incident classification and categorization levels?

A.

Maturity of incident response activities

B.

Threat environment

C.

Quantity of impacted assets

D.

Incident impact

Full Access
Question # 90

The PRIMARY reason to properly classify information assets is to determine:

A.

appropriate encryption strength using a risk-based approach.

B.

the business impact if assets are compromised.

C.

the appropriate protection based on sensitivity.

D.

user access levels based on the need to know.

Full Access
Question # 91

For an e-business that requires high availability, which of the following design principles is BEST?

A.

Manual failover to the website of another e-business that meets the user's needs

B.

A single point of entry allowing transactions to be received and processed quickly

C.

Intelligent middleware to direct transactions from a downed system to an alternative

D.

Availability of an adjacent cold site and a standby server with mirrored copies of critical data

Full Access
Question # 92

Which of the following should be the PRIMARY objective of an information security governance framework?

A.

Provide a baseline for optimizing the security profile of the organization.

B.

Demonstrate senior management commitment.

C.

Demonstrate compliance with industry best practices to external stakeholders.

D.

Ensure that users comply with the organization's information security policies.

Full Access
Question # 93

The PRIMARY purpose for conducting cybersecurity risk assessments is to:

A.

Assist in security reporting to senior management

B.

Provide metrics to indicate cybersecurity program effectiveness

C.

Verify compliance across multiple sectors

D.

Understand the organization's current security posture

Full Access
Question # 94

When establishing an information security governance framework, it is MOST important for an information security manager to understand:

A.

information security best practices.

B.

risk management techniques.

C.

the threat environment.

D.

the corporate culture.

Full Access
Question # 95

Which of the following BEST enables the restoration of operations after a limited ransomware incident occurs?

A.

Reliable image backups

B.

Impact assessment

C.

Documented eradication procedures

D.

Root cause analysis

Full Access
Question # 96

The categorization of incidents is MOST important for evaluating which of the following?

A.

Appropriate communication channels

B.

Allocation of needed resources

C.

Risk severity and incident priority

D.

Response and containment requirements

Full Access
Question # 97

Which of the following is the MOST important issue in a penetration test?

A.

Having an independent group perform the test

B.

Obtaining permission from audit

C.

Performing the test without the benefit of any insider knowledge

D.

Having a defined goal as well as success and failure criteria

Full Access
Question # 98

Which of the following BEST indicates that information assets are classified accurately?

A.

Appropriate prioritization of information risk treatment

B.

Increased compliance with information security policy

C.

Appropriate assignment of information asset owners

D.

An accurate and complete information asset catalog

Full Access
Question # 99

Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?

A.

Alignment with financial reporting

B.

Alignment with business initiatives

C.

Alignment with industry frameworks

D.

Alignment with risk appetite

Full Access
Question # 100

Which of the following is the MOST essential element of an information security program?

A.

Benchmarking the program with global standards for relevance

B.

Prioritizing program deliverables based on available resources

C.

Involving functional managers in program development

D.

Applying project management practices used by the business

Full Access
Question # 101

In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?

A.

Maturity of the security policy

B.

Clarity of security roles and responsibilities

C.

Corporate culture

D.

Corporate risk framework

Full Access
Question # 102

How does an incident response team BEST leverage the results of a business impact analysis (BIA)?

A.

Assigning restoration priority during incidents

B.

Determining total cost of ownership (TCO)

C.

Evaluating vendors critical to business recovery

D.

Calculating residual risk after the incident recovery phase

Full Access
Question # 103

Prior to conducting a forensic examination, an information security manager should:

A.

boot the original hard disk on a clean system.

B.

create an image of the original data on new media.

C.

duplicate data from the backup media.

D.

shut down and relocate the server.

Full Access
Question # 104

The contribution of recovery point objective (RPO) to disaster recovery is to:

A.

minimize outage periods.

B.

eliminate single points of failure.

C.

define backup strategy

D.

reduce mean time between failures (MTBF).

Full Access
Question # 105

An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?

A.

Conduct an impact assessment.

B.

Isolate the affected systems.

C.

Rebuild the affected systems.

D.

Initiate incident response.

Full Access
Question # 106

When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:

A.

consider the organizations business strategy.

B.

consider the strategic objectives of the program.

C.

leverage industry benchmarks.

D.

identify the program's risk and compensating controls.

Full Access
Question # 107

Which of the following is the PRIMARY benefit of training service desk staff to recognize incidents?

A.

Incident response plan can be activated in a timely manner.

B.

Incident metrics can be communicated.

C.

Risk response options can be identified quickly.

D.

Incident classification times can be improved.

Full Access
Question # 108

Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?

A.

Mail relay server

B.

Proxy server

C.

Database server

D.

Application server

Full Access
Question # 109

How would the information security program BEST support the adoption of emerging technologies?

A.

Conducting a control assessment

B.

Developing an emerging technology roadmap

C.

Providing effective risk governance

D.

Developing an acceptable use policy

Full Access
Question # 110

Which of the following tasks would provide a newly appointed information security manager with the BEST view of the organization's existing security posture?

A.

Reviewing policies and procedures

B.

Performing a risk assessment

C.

Interviewing business managers and employees

D.

Performing a business impact analysis (BIA)

Full Access
Question # 111

Which of the following should be an information security manager's FIRST course of action when a potential business breach is discovered in a critical business system?

A.

Implement mitigating actions immediately.

B.

Invoke the incident response plan.

C.

Inform senior management of the breach.

D.

Validate the breach.

Full Access
Question # 112

Which of the following will ensure confidentiality of content when accessing an email system over the Internet?

A.

Multi-factor authentication

B.

Digital encryption

C.

Data masking

D.

Digital signatures

Full Access
Question # 113

Which of the following should be an information security manager s MOST important consideration when determining the priority for implementing security controls?

A.

Alignment with industry benchmarks

B.

Results of business impact analyses (BIAs)

C.

Possibility of reputational loss due to incidents

D.

Availability of security budget

Full Access
Question # 114

Which of the following is the MOST important objective when planning an incident response program?

A.

Managing resources

B.

Ensuring IT resiliency

C.

Recovering from a disaster

D.

Minimizing business impact

Full Access
Question # 115

Which of the following is MOST helpful to identify whether information security policies have been followed?

A.

Preventive controls

B.

Detective controls

C.

Directive controls

D.

Corrective controls

Full Access
Question # 116

Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?

A.

Security metrics

B.

Security baselines

C.

Security incident details

D.

Security risk exposure

Full Access
Question # 117

A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?

A.

Provide end-user training.

B.

Escalate to senior management.

C.

Continue to enforce the policy.

D.

Conduct a business impact analysis (BIA).

Full Access
Question # 118

Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:

A.

number of impacted users.

B.

capability of incident handlers.

C.

type of confirmed incident.

D.

predicted incident duration.

Full Access
Question # 119

Which of the following is the PRIMARY reason to use a phased incident recovery approach?

A.

To gain management buy-in

B.

To give the response team time to analyze incidents

C.

To ensure critical systems are recovered first

D.

To prioritize remediation steps

Full Access
Question # 120

A global organization is developing an incident response team. The organization wants to keep headquarters informed of all incidents and wants to be able to present a unified response to widely dispersed events. Which of the following BEST supports these objectives?

A.

Virtual incident response team

B.

Distributed incident response team

C.

Outsourced incident response team

D.

Centralized incident response team

Full Access
Question # 121

Which of the following BEST enables an information security manager to demonstrate the effectiveness of the information security and risk program to senior management?

A.

Updated risk assessments

B.

Counts of information security incidents

C.

Audit reports

D.

Monthly metrics

Full Access
Question # 122

An information security manager finds that a soon-to-be deployed online application will increase risk beyond acceptable levels, and necessary controls have not been included. Which of the following is the BEST course of action for the information security manager?

A.

Instruct IT to deploy controls based on urgent business needs.

B.

Present a business case for additional controls to senior management.

C.

Solicit bids for compensating control products.

D.

Recommend a different application.

Full Access
Question # 123

An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?

A.

The number of blocked external attacks is not representative of the true threat profile.

B.

The number of blocked external attacks will vary by month, causing inconsistent graphs.

C.

The number of blocked external attacks is an indicator of the organization's popularity.

D.

The number of blocked external attacks over time does not explain the attackers' motivations.

Full Access
Question # 124

Which of the following BEST determines the allocation of resources during a security incident response?

A.

Senior management commitment

B.

A business continuity plan (BCP)

C.

An established escalation process

D.

Defined levels of severity

Full Access
Question # 125

In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.

Before relying on this certification, it is MOST important that the information security manager confirms that the:

A.

current international standard was used to assess security processes.

B.

certification will remain current through the life of the contract.

C.

certification scope is relevant to the service being offered.

D.

certification can be extended to cover the client's business.

Full Access
Question # 126

Capacity planning would prevent:

A.

file system overload arising from distributed denial of service (DDoS) attacks.

B.

system downtime for scheduled security maintenance.

C.

application failures arising from insufficient hardware resources.

D.

software failures arising from exploitation of buffer capacity vulnerabilities.

Full Access
Question # 127

The MOST effective tools for responding to new and advanced attacks are those that detect attacks based on:

A.

signature analysis.

B.

behavior analysis.

C.

penetration testing.

D.

data packet analysis.

Full Access
Question # 128

Which of the following processes is MOST important for the success of a business continuity plan (BCP)?

A.

Involving all stakeholders in testing and training

B.

Scheduling periodic internal and external audits

C.

Including the board and senior management in plan reviews

D.

Maintaining copies of the plan at the primary and recovery sites

Full Access
Question # 129

Which of the following is MOST important to the successful implementation of an information security program?

A.

Adequate security resources are allocated to the program.

B.

Key performance indicators (KPIs) are defined.

C.

A balanced scorecard is approved by the steering committee.

D.

The program is developed using global security standards.

Full Access
Question # 130

A technical vulnerability assessment on a personnel information management server should be performed when:

A.

the data owner leaves the organization unexpectedly.

B.

changes are made to the system configuration.

C.

the number of unauthorized access attempts increases.

D.

an unexpected server outage has occurred.

Full Access
Question # 131

A Seat a-hosting organization's data center houses servers, appli

BEST approach for developing a physical access control policy for the organization?

A.

Review customers’ security policies.

B.

Conduct a risk assessment to determine security risks and mitigating controls.

C.

Develop access control requirements for each system and application.

D.

Design single sign-on (SSO) or federated access.

Full Access
Question # 132

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?

A.

Wipe and reset the endpoint device.

B.

Isolate the endpoint device.

C.

Power off the endpoint device.

D.

Run a virus scan on the endpoint device.

Full Access
Question # 133

Relationships between critical systems are BEST understood by

A.

evaluating key performance indicators (KPIs)

B.

performing a business impact analysis (BIA)

C.

developing a system classification scheme

D.

evaluating the recovery time objectives (RTOs)

Full Access
Question # 134

Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?

A.

Information security program metrics

B.

Results of a recent external audit

C.

The information security operations matrix

D.

Changes to information security risks

Full Access
Question # 135

A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?

A.

Information security manager

B.

Security policy author

C.

Creator of the document

D.

Data custodian

Full Access
Question # 136

Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?

A.

IT strategy

B.

Recovery strategy

C.

Risk mitigation strategy

D.

Security strategy

Full Access
Question # 137

What is the PRIMARY objective of performing a vulnerability assessment following a business system update?

A.

Determine operational losses.

B.

Improve the change control process.

C.

Update the threat landscape.

D.

Review the effectiveness of controls

Full Access
Question # 138

Which of the following will BEST facilitate the integration of information security governance into enterprise governance?

A.

Developing an information security policy based on risk assessments

B.

Establishing an information security steering committee

C.

Documenting the information security governance framework

D.

Implementing an information security awareness program

Full Access
Question # 139

Which of the following is the PRIMARY impact of organizational culture on the effectiveness of an information security program?

A.

The culture shapes behaviors toward information security.

B.

The culture defines responsibilities necessary for program implementation.

C.

The culture helps determine budget for information security controls.

D.

The culture has minimal impact as long as information security controls are adhered to.

Full Access
Question # 140

An organization has decided to implement an Internet of Things (IoT) solution to remain competitive in the market. Which of the following should information security do FIRST?

A.

Recalculate risk profile

B.

Implement compensating controls

C.

Reassess risk tolerance levels

D.

Update the security architecture

Full Access
Question # 141

Which of the following provides the BEST indication of the return on information security investment?

A.

Increased annualized loss expectancy (ALE)

B.

Increased number of reported incidents

C.

Reduced annualized loss expectancy (ALE)

D.

Decreased number of reported incidents

Full Access
Question # 142

To prepare for a third-party forensics investigation following an incident involving malware, the incident response team should:

A.

isolate the infected systems.

B.

preserve the evidence.

C.

image the infected systems.

D.

clean the malware.

Full Access
Question # 143

Business objectives and organizational risk appetite are MOST useful inputs to the development of information security:

A.

strategy.

B.

risk assessments.

C.

key performance indicators (KPIs).

D.

standards.

Full Access
Question # 144

An information security manager learns of a new standard related to an emerging technology the organization wants to implement. Which of the following should the information security manager recommend be done FIRST?

A.

Determine whether the organization can benefit from adopting the new standard.

B.

Obtain legal counsel's opinion on the standard's applicability to regulations,

C.

Perform a risk assessment on the new technology.

D.

Review industry specialists’ analyses of the new standard.

Full Access
Question # 145

Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?

A.

It transfers the risk associated with recovery to a third party.

B.

It lowers the annual cost to the business.

C.

It eliminates the need to maintain offsite facilities.

D.

It eliminates the need for the business to perform testing.

Full Access
Question # 146

Which of the following will BEST enable an effective information asset classification process?

A.

Including security requirements in the classification process

B.

Analyzing audit findings

C.

Reviewing the recovery time objective (RTO) requirements of the asset

D.

Assigning ownership

Full Access
Question # 147

Which of the following would BEST support the business case for an increase in the information security budget?

A.

Cost-benefit analysis results

B.

Comparison of information security budgets with peer organizations

C.

Business impact analysis (BIA) results

D.

Frequency of information security incidents

Full Access
Question # 148

An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?

A.

Implementing automated vulnerability scanning in the help desk workflow

B.

Changing the default setting for all security incidents to the highest priority

C.

Integrating automated service level agreement (SLA) reporting into the help desk ticketing system

D.

Integrating incident response workflow into the help desk ticketing system

Full Access
Question # 149

A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?

A.

Right of the subscriber to conduct onsite audits of the vendor

B.

Escrow of software code with conditions for code release

C.

Authority of the subscriber to approve access to its data

D.

Commingling of subscribers' data on the same physical server

Full Access
Question # 150

Which type of system is MOST effective for monitoring cyber incidents based on impact and tracking them until they are closed?

A.

Endpoint detection and response (EDR)

B.

Network intrusion detection system (NIDS)

C.

Extended detection and response (XDR)

D.

Security information and event management (SIEM)

Full Access
Question # 151

Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?

A.

Report the risk associated with the policy breach.

B.

Enforce the security configuration and require the change to be reverted.

C.

Implement compensating controls to address the risk.

D.

Implement a privileged access management system.

Full Access
Question # 152

Which of the following BEST facilitates effective incident response testing?

A.

Including all business units in testing

B.

Simulating realistic test scenarios

C.

Reviewing test results quarterly

D.

Testing after major business changes

Full Access
Question # 153

The PRIMARY advantage of single sign-on (SSO) is that it will:

A.

increase efficiency of access management

B.

increase the security of related applications.

C.

strengthen user passwords.

D.

support multiple authentication mechanisms.

Full Access
Question # 154

A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?

A.

The time and location that the breach occurred

B.

Evidence of previous incidents caused by the user

C.

The underlying reason for the user error

D.

Appropriate disciplinary procedures for user error

Full Access
Question # 155

Which of the following BEST enables staff acceptance of information security policies?

A.

Strong senior management support

B.

Gomputer-based training

C.

Arobust incident response program

D.

Adequate security funding

Full Access
Question # 156

Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?

A.

Compartmentalization

B.

Overlapping redundancy

C.

Continuous monitoring

D.

Multi-factor authentication

Full Access
Question # 157

Which of the following BEST indicates that an information security governance framework has been successfully implemented?

A.

The framework aligns internal and external resources.

B.

The framework aligns security processes with industry best practices.

C.

The framework aligns management and other functions within the security organization.

D.

The framework includes commercial off-the-shelf security solutions.

Full Access
Question # 158

An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?

A.

The total cost of the investment

B.

The cost and associated risk reduction

C.

The number and severity of ransomware incidents

D.

Benchmarks of industry peers impacted by ransomware

Full Access
Question # 159

Which of the following is the MOST critical factor for information security program success?

A.

comprehensive risk assessment program for information security

B.

The information security manager's knowledge of the business

C.

Security staff with appropriate training and adequate resources

D.

Ongoing audits and addressing open items

Full Access
Question # 160

During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?

A.

Post-incident review

B.

Eradication

C.

Containment

D.

Identification

Full Access
Question # 161

When determining an acceptable risk level which of the following is the MOST important consideration?

A.

Threat profiles

B.

System criticalities

C.

Vulnerability scores

D.

Risk matrices

Full Access
Question # 162

Which of the following is the PRIMARY objective of incident triage?

A.

Coordination of communications

B.

Mitigation of vulnerabilities

C.

Categorization of events

D.

Containment of threats

Full Access
Question # 163

Which of the following would BEST justify continued investment in an information security program?

A.

Reduction in residual risk

B.

Security framework alignment

C.

Speed of implementation

D.

Industry peer benchmarking

Full Access
Question # 164

Which of the following is the BEST approach for data owners to use when defining access privileges for users?

Define access privileges based on user roles.

Adopt user account settings recommended by the vendor.

Perform a risk assessment of the users' access privileges.

A.

Implement an identity and access management (IDM) tool.

Full Access
Question # 165

Which of the following activities is designed to handle a control failure that leads to a breach?

A.

Risk assessment

B.

Incident management

C.

Root cause analysis

D.

Vulnerability management

Full Access
Question # 166

Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?

A.

Documentation of control procedures

B.

Standardization of compliance requirements

C.

Automation of controls

D.

Integration of assurance efforts

Full Access
Question # 167

An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?

A.

The information security manager

B.

The data owner

C.

The application owner

D.

The security engineer

Full Access
Question # 168

Which of the following should be established FIRST when implementing an information security governance framework?

A.

Security architecture

B.

Security policies

C.

Security incident management team

D.

Security awareness training program

Full Access
Question # 169

Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?

A.

Impact on compliance risk.

B.

Inability to determine short-term impact.

C.

Impact on the risk culture.

D.

Deviation from risk management best practices

Full Access
Question # 170

Which of the following should be the PRIMARY basis for a severity hierarchy for information security incident classification?

A.

Availability of resources

B.

Root cause analysis results

C.

Adverse effects on the business

D.

Legal and regulatory requirements

Full Access
Question # 171

A finance department director has decided to outsource the organization's budget application and has identified potential providers. Which of the following actions should be initiated FIRST by IN information security manager?

A.

Determine the required security controls for the new solution

B.

Review the disaster recovery plans (DRPs) of the providers

C.

Obtain audit reports on the service providers' hosting environment

D.

Align the roles of the organization's and the service providers' stats.

Full Access
Question # 172

An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?

A.

Identification of risk

B.

Analysis of control gaps

C.

Design of key risk indicators (KRIs)

D.

Selection of risk treatment options

Full Access
Question # 173

Which of the following should be the MOST important consideration of business continuity management?

A.

Ensuring human safety

B.

Identifying critical business processes

C.

Ensuring the reliability of backup data

D.

Securing critical information assets

Full Access
Question # 174

Which of the following BEST indicates that information security governance and corporate governance are integrated?

A.

The information security team is aware of business goals.

B.

The board is regularly informed of information security key performance indicators (KPIs),

C.

The information security steering committee is composed of business leaders.

D.

A cost-benefit analysis is conducted on all information security initiatives.

Full Access
Question # 175

An organization wants to migrate a proprietary application to be hosted by a third-party cloud hosting provider using a Platform as a Service (PaaS) model. Prior to selecting the cloud provider, what is MOST important for the organization to ensure?

A.

The cloud provider can meet recovery point objectives (RPOs).

B.

The cloud provider adheres to applicable regulations.

C.

The cloud provider’s service level agreement (SLA) includes availability requirements.

D.

The hosting contract has a termination clause.

Full Access
Question # 176

Which of the following is the GREATEST challenge when developing key risk indicators (KRIs)?

A.

Limiting the number of KRIs

B.

Comprehensively reporting on KRIs

C.

Aggregating common KRIs

D.

Linking KRIs to specific risks

Full Access
Question # 177

A security incident has been reported within an organization. When should an information security manager contact the information owner?

A.

After the incident has been contained

B.

After the incident has been mitigated

C.

After the incident has been confirmed

D.

After the potential incident has been logged

Full Access
Question # 178

Which of the following should be done NEXT following senior management's decision to comply with new personal data regulations that are much more stringent than those currently followed to avoid massive fines?

A.

Encrypt data in transit and at rest.

B.

Complete a return on investment (ROI) analysis.

C.

Create and implement a data minimization plan.

D.

Conduct a gap analysis.

Full Access
Question # 179

For the information security manager, integrating the various assurance functions of an organization is important PRIMARILY to enable:

A.

consistent security.

B.

comprehensive audits

C.

a security-aware culture

D.

compliance with policy

Full Access
Question # 180

An organization that conducts business globally is planning to utilize a third-party service provider to process payroll information. Which of the following issues poses the GREATEST risk to the organization?

A.

The third party does not have an independent assessment of controls available for review.

B.

The third party has not provided evidence of compliance with local regulations where data is generated.

C.

The third-party contract does not include an indemnity clause for compensation in the event of a breach.

D.

The third party's service level agreement (SLA) does not include guarantees of uptime.

Full Access
Question # 181

How does an organization PRIMARILY benefit from the creation of an information security steering committee?

A.

An increase in information security risk awareness

B.

An increased alignment with industry security trends that impact the business

C.

An increased focus on information security resource management

D.

An increased alignment of information security with the business

Full Access
Question # 182

If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:

A.

contact law enforcement.

B.

document the chain of custody.

C.

capture evidence using standard server-backup utilities.

D.

reboot affected machines in a secure area to search for evidence.

Full Access
Question # 183

Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?

A.

Service level agreement (SLA)

B.

Business continuity plan (BCP)

C.

Disaster recovery plan (DRP)

D.

Business impact analysis (BIA)

Full Access
Question # 184

Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?

A.

Requiring an external security audit of the IT service provider

B.

Requiring regular reporting from the IT service provider

C.

Defining information security requirements with internal IT

D.

Defining the business recovery plan with the IT service provider

Full Access
Question # 185

To improve the efficiency of the development of a new software application, security requirements should be defined:

A.

based on code review.

B.

based on available security assessment tools.

C.

after functional requirements.

D.

concurrently with other requirements.

Full Access
Question # 186

Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?

A.

Execution of unauthorized commands

B.

Prevention of authorized access

C.

Defacement of website content

D.

Unauthorized access to resources

Full Access
Question # 187

Which of the following is the BEST indication that an organization has a mature information security culture?

A.

Information security training is mandatory for all staff.

B.

The organization's information security policy is documented and communicated.

C.

The chief information security officer (CISO) regularly interacts with the board.

D.

Staff consistently consider risk in making decisions.

Full Access
Question # 188

Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?

A.

Mobile application control

B.

Inconsistent device security

C.

Configuration management

D.

End user acceptance

Full Access
Question # 189

An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?

A.

Preventive

B.

Corrective

C.

Detective

D.

Deterrent

Full Access
Question # 190

A new information security reporting requirement will soon become effective. Which of the following should be the information security manager's FIRST action?

A.

Conduct a cost-benefit analysis related to noncompliance with the new requirement.

B.

Perform a gap assessment against the new requirement.

C.

Investigate to determine whether the new requirement applies to the business.

D.

Inform senior management of the new requirement.

Full Access
Question # 191

Which of the following is MOST effective in monitoring an organization's existing risk?

A.

Periodic updates to risk register

B.

Risk management dashboards

C.

Security information and event management (SIEM) systems

D.

Vulnerability assessment results

Full Access
Question # 192

Which of the following BEST determines the data retention strategy and subsequent policy for an organization?

A.

Business impact analysis (BIA)

B.

Business requirements

C.

Supplier requirements

D.

Risk appetite

Full Access
Question # 193

An organization plans to offer clients a new service that is subject to regulations. What should the organization do FIRST when developing a security strategy in support of this new service?

A.

Determine security controls for the new service.

B.

Establish a compliance program,

C.

Perform a gap analysis against the current state

D.

Hire new resources to support the service.

Full Access
Question # 194

After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?

A.

The service level agreement (SLA) was not met.

B.

The recovery time objective (RTO) was not met.

C.

The root cause was not identified.

D.

Notification to stakeholders was delayed.

Full Access
Question # 195

Which of the following BEST enables an organization to provide ongoing assurance that legal and regulatory compliance requirements can be met?

A.

Embedding compliance requirements within operational processes

B.

Engaging external experts to provide guidance on changes in compliance requirements

C.

Performing periodic audits for compliance with legal and regulatory requirements

D.

Assigning the operations manager accountability for meeting compliance requirements

Full Access
Question # 196

Which of the following should be done FIRST when establishing a new data protection program that must comply with applicable data privacy regulations?

A.

Evaluate privacy technologies required for data protection.

B.

Encrypt all personal data stored on systems and networks.

C.

Update disciplinary processes to address privacy violations.

D.

Create an inventory of systems where personal data is stored.

Full Access
Question # 197

An organization has acquired a new system with strict maintenance instructions and schedules. Where should this information be documented?

A.

Standards

B.

Policies

C.

Guidelines

D.

Procedures

Full Access
Question # 198

Which of the following is the PRIMARY benefit of implementing an information security governance framework?

A.

The framework defines managerial responsibilities for risk impacts to business goals.

B.

The framework provides direction to meet business goals while balancing risks and controls.

C.

The framework provides a roadmap to maximize revenue through the secure use of technology.

D.

The framework is able to confirm the validity of business goals and strategies.

Full Access
Question # 199

Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?

A.

Number of blocked intrusion attempts

B.

Number of business cases reviewed by senior management

C.

Trends in the number of identified threats to the business

D.

Percentage of controls integrated into business processes

Full Access
Question # 200

Which of the following is the BEST way lo monitor for advanced persistent threats (APT) in an organization?

A.

Network with peers in the industry to share information.

B.

Browse the Internet to team of potential events

C.

Search for anomalies in the environment

D.

Search for threat signatures in the environment.

Full Access
Question # 201

Which of the following should be the FIRST step in patch management procedures when receiving an emergency security patch?

A.

Schedule patching based on the criticality.

B.

Install the patch immediately to eliminate the vulnerability.

C.

Conduct comprehensive testing of the patch.

D.

Validate the authenticity of the patch.

Full Access
Question # 202

When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?

A.

Managing the impact

B.

Identifying unacceptable risk levels

C.

Assessing vulnerabilities

D.

Evaluating potential threats

Full Access
Question # 203

Which risk is introduced when using only sanitized data for the testing of applications?

A.

Data loss may occur during the testing phase.

B.

Data disclosure may occur during the migration event

C.

Unexpected outcomes may arise in production

D.

Breaches of compliance obligations will occur.

Full Access
Question # 204

Which of the following is necessary to ensure consistent protection for an organization's information assets?

A.

Classification model

B.

Control assessment

C.

Data ownership

D.

Regulatory requirements

Full Access
Question # 205

Which of the following sources is MOST useful when planning a business-aligned information security program?

A.

Security risk register

B.

Information security policy

C.

Business impact analysis (BIA)

D.

Enterprise architecture (EA)

Full Access
Question # 206

Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?

A.

Providing training from third-party forensics firms

B.

Obtaining industry certifications for the response team

C.

Conducting tabletop exercises appropriate for the organization

D.

Documenting multiple scenarios for the organization and response steps

Full Access
Question # 207

In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:

A.

evaluate results of the most recent incident response test.

B.

review the number of reported security incidents.

C.

ensure established security metrics are reported.

D.

assess progress of risk mitigation efforts.

Full Access
Question # 208

Which of the following is MOST important to determine following the discovery and eradication of a malware attack?

A.

The malware entry path

B.

The creator of the malware

C.

The type of malware involved

D.

The method of detecting the malware

Full Access
Question # 209

Which of the following is the GREATEST benefit of classifying information security incidents?

A.

Reporting capabilities

B.

Improved chain of custody

C.

Comprehensive documentation

D.

Prioritized recovery

Full Access
Question # 210

Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?

A.

Senior management

B.

Information owner

C.

Business manager

D.

Information security manager

Full Access
Question # 211

Which of the following should be done FIRST when a SIEM flags a potential event?

A.

Validate the event is not a false positive.

B.

Initiate the incident response plan.

C.

Escalate the event to the business owner.

D.

Implement compensating controls.

Full Access
Question # 212

Which of the following is the MOST important factor in an organization's selection of a key risk indicator (KRI)?

A.

Return on investment (ROI)

B.

Compliance requirements

C.

Target audience

D.

Criticality of information

Full Access
Question # 213

The MAIN benefit of implementing a data loss prevention (DLP) solution is to:

A.

enhance the organization's antivirus controls.

B.

eliminate the risk of data loss.

C.

complement the organization's detective controls.

D.

reduce the need for a security awareness program.

Full Access
Question # 214

An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?

A.

Prepare an executive summary for senior management

B.

Gather feedback on business impact

C.

Conduct a meeting to capture lessons learned.

D.

Secure and preserve digital evidence for analysis.

Full Access
Question # 215

A PRIMARY purpose of creating security policies is to:

A.

define allowable security boundaries.

B.

communicate management's security expectations.

C.

establish the way security tasks should be executed.

D.

implement management's security governance strategy.

Full Access
Question # 216

During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?

A.

Configuration management

B.

Password management

C.

Change management

D.

Version management

Full Access
Question # 217

An organization has been penalized by regulatory authorities for failing to notify them of a major security breach that may have compromised customer data. Which of the following is MOST likely in need of review and updating to prevent similar penalties in the future?

A.

Information security policies and procedures

B.

Business continuity plan (BCP)

C.

Incident communication plan

D.

Incident response training program

Full Access
Question # 218

Which of the following backup methods requires the MOST time to restore data for an application?

A.

Full backup

B.

Incremental

C.

Differential

D.

Disk mirroring

Full Access
Question # 219

Which of the following is MOST important to consider when determining asset valuation?

A.

Asset recovery cost

B.

Asset classification level

C.

Cost of insurance premiums

D.

Potential business loss

Full Access
Question # 220

To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?

A.

Request the service provider comply with information security policy.

B.

Review a recent independent audit report of the service provider.

C.

Assess the level of security awareness of the service provider.

D.

Review samples of service level reports from the service provider.

Full Access
Question # 221

Which of the following BEST enables an organization to maintain an appropriate security control environment?

A.

Alignment to an industry security framework

B.

Budgetary support for security

C.

Periodic employee security training

D.

Monitoring of the threat landscape

Full Access
Question # 222

Which of the following is the MOST effective defense against malicious insiders compromising confidential information?

A.

Regular audits of access controls

B.

Strong background checks when hiring staff

C.

Prompt termination procedures

D.

Role-based access control (RBAC)

Full Access
Question # 223

Which of the following is the BEST defense against a brute force attack?

A.

Time-of-day restrictions

B.

Mandatory access control

C.

Discretionary access control

D.

Multi-factor authentication (MFA)

Full Access
Question # 224

Which of the following activities is MOST appropriate to conduct during the eradication phase of a cyber incident response?

A.

Restore affected systems for normal operations.

B.

Mitigate exploited vulnerabilities to stop future incidents.

C.

Estimate the amount of damage caused by the incident.

D.

Isolate affected systems to prevent further damage

Full Access
Question # 225

While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?

A.

Assign responsibility to the database administrator (DBA).

B.

Review the databases for sensitive content.

C.

Prepare a report of the databases for senior management.

D.

Assign the highest classification level to those databases.

Full Access
Question # 226

Which of the following is the MOST important factor in successfully implementing Zero Trust?

A.

Preferring networks that have undergone penetration testing

B.

Focusing on logging and monitoring of user behavior

C.

Authenticating and authorizing strategic points of the architecture

D.

Understanding each component of the network

Full Access
Question # 227

An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?

A.

Escalate to the chief risk officer (CRO).

B.

Conduct a vulnerability analysis.

C.

Conduct a risk analysis.

D.

Determine compensating controls.

Full Access
Question # 228

Which of the following metrics is MOST appropriate for evaluating the incident notification process?

A.

Average total cost of downtime per reported incident

B.

Elapsed time between response and resolution

C.

Average number of incidents per reporting period

D.

Elapsed time between detection, reporting, and response

Full Access
Question # 229

Which of the following metrics would provide an accurate measure of an information security program's performance?

A.

A collection of qualitative indicators that accurately measure security exceptions

B.

A combination of qualitative and quantitative trends that enable decision making

C.

A collection of quantitative indicators that are compared against industry benchmarks

D.

A single numeric score derived from various measures assigned to the security program

Full Access
Question # 230

Which of the following is the PRIMARY objective of testing security controls within a critical infrastructure?

A.

Ensuring the continued resilience and security of IT services

B.

Decreasing the percentage of security deployments that cause failures in production

C.

Reducing the number of control assessments to optimize resources

D.

Identifying and addressing security team performance issues

Full Access
Question # 231

Which of the following presents the GREATEST risk associated with the use of an automated security information and event management (SIEM) system?

A.

Low number of false positives

B.

Low number of false negatives

C.

High number of false positives

D.

High number of false negatives

Full Access
Question # 232

Which of the following BEST enables an organization to maintain legally admissible evidence7

A.

Documented processes around forensic records retention

B.

Robust legal framework with notes of legal actions

C.

Chain of custody forms with points of contact

D.

Forensic personnel training that includes technical actions

Full Access
Question # 233

Which of the following is the MOST important consideration when establishing an organization's information security governance committee?

A.

Members have knowledge of information security controls.

B.

Members are business risk owners.

C.

Members are rotated periodically.

D.

Members represent functions across the organization.

Full Access
Question # 234

The BEST way to report to the board on the effectiveness of the information security program is to present:

A.

a dashboard illustrating key performance metrics.

B.

a summary of the most recent audit findings.

C.

peer-group industry benchmarks.

D.

a report of cost savings from process improvements.

Full Access
Question # 235

Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?

A.

Review compliance requirements.

B.

Communicate the exposure.

C.

Declare an incident.

D.

Change the encryption keys.

Full Access
Question # 236

Which of the following is MOST important to have in place as a basis for developing an effective information security program that supports the organization's business goals?

A.

Metrics to drive the information security program

B.

Information security policies

C.

A defined security organizational structure

D.

An information security strategy

Full Access
Question # 237

Which of the following is the BEST way to compete for funding for an information security program in an organization with limited resources?

A.

Demonstrate the effectiveness of business continuity plans (BCPs).

B.

Report key performance indicator (KPI) trends.

C.

Demonstrate that the program enables business activities.

D.

Provide evidence of increased security events at peer organizations.

Full Access
Question # 238

Which of the following is the BEST course of action after management has reviewed an identified risk and determines the risk is below the defined risk appetite?

A.

Accept

B.

Avoid

C.

Transfer

D.

Mitigate

Full Access
Question # 239

Which of the following is the MOST effective way to detect security incidents?

A.

Analyze recent security risk assessments.

B.

Analyze security anomalies.

C.

Analyze penetration test results.

D.

Analyze vulnerability assessments.

Full Access
Question # 240

An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:

A.

service level agreements (SLAs)

B.

security requirements for the process being outsourced.

C.

risk-reporting methodologies.

D.

security metrics

Full Access
Question # 241

An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?

A.

Focus the review on the infrastructure with the highest risk

B.

Review controls listed in the vendor contract

C.

Determine whether the vendor follows the selected security framework rules

D.

Review the vendor's security policy

Full Access
Question # 242

Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?

A.

Assess changes in the risk profile.

B.

Activate the disaster recovery plan (DRP).

C.

Invoke the incident response plan.

D.

Conduct security awareness training.

Full Access
Question # 243

Which of the following business units should own the data that populates an identity management system?

A.

Human resources (HR)

B.

Legal

C.

Information technology

D.

Information security

Full Access
Question # 244

A common drawback of email software packages that provide native encryption of messages is that the encryption:

A.

cannot encrypt attachments

B.

cannot interoperate across product domains.

C.

has an insufficient key length.

D.

has no key-recovery mechanism.

Full Access
Question # 245

The PRIMARY objective of a post-incident review of an information security incident is to:

A.

update the risk profile

B.

minimize impact

C.

prevent recurrence.

D.

determine the impact

Full Access
Question # 246

What is the MOST important consideration for an organization operating in a highly regulated market when new regulatory requirements with high impact to the business need to be implemented?

A.

Engaging an external audit

B.

Establishing compensating controls

C.

Enforcing strong monitoring controls

D.

Conducting a gap analysis

Full Access
Question # 247

The PRIMARY objective of timely declaration of a disaster is to:

A.

ensure engagement of business management in the recovery process.

B.

assess and correct disaster recovery process deficiencies.

C.

protect critical physical assets from further loss.

D.

ensure the continuity of the organization's essential services.

Full Access
Question # 248

A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?

A.

Conduct automated scans on applications before deployment.

B.

Supplement existing development teams with security engineers.

C.

Integrate information security into existing change management.

D.

Create a new governance council for application security.

Full Access
Question # 249

What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?

A.

Perform a vulnerability assessment on the systems within the department.

B.

Introduce additional controls to force compliance with policy.

C.

Require department users to repeat security awareness training.

D.

Report the policy violation to senior management.

Full Access
Question # 250

Following an employee security awareness training program, what should be the expected outcome?

A.

A decrease in the number of viruses detected in incoming emails

B.

A decrease in reported social engineering attacks

C.

An increase in reported social engineering attempts

D.

An increase in user-reported false positive incidents

Full Access
Question # 251

When developing an asset classification program, which of the following steps should be completed FIRST?

A.

Categorize each asset.

B.

Create an inventory. &

C.

Create a business case for a digital rights management tool.

D.

Implement a data loss prevention (OLP) system.

Full Access
Question # 252

What should be the GREATEST concern for an information security manager of a large multinational organization when outsourcing data processing to a cloud service provider?

A.

Vendor service level agreements (SLAs)

B.

Independent review of the vendor

C.

Local laws and regulations

D.

Backup and restoration of data

Full Access
Question # 253

Which of the following is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?

A.

To reduce the overall cost of policy development

B.

To share responsibility for addressing security breaches

C.

To decrease the workload of the IT department

D.

To gain acceptance of the policy across the organization

Full Access
Question # 254

Which of the following would provide the MOST value to senior management when presenting the results of a risk assessment?

A.

Mapping the risks to the security classification scheme

B.

Illustrating risk on a heat map

C.

Mapping the risks to existing controls

D.

Providing a technical risk assessment report

Full Access
Question # 255

Which of the following BEST protects against emerging advanced persistent threat (APT) actors?

A.

Honeypot environment

B.

Updated security awareness materials

C.

Ongoing incident response training

D.

Proactive monitoring

Full Access
Question # 256

An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?

A.

Benchmark the processes with best practice to identify gaps.

B.

Calculate the return on investment (ROI).

C.

Provide security awareness training to HR.

D.

Assess the business objectives of the processes.

Full Access
Question # 257

Which of the following is MOST important to ensuring that incident management plans are executed effectively?

A.

Management support and approval has been obtained.

B.

The incident response team has the appropriate training.

C.

An incident response maturity assessment has been conducted.

D.

A reputable managed security services provider has been engaged.

Full Access
Question # 258

A data loss prevention (DLP) tool has flagged personally identifiable information (Pll) during transmission. Which of the following should the information security manager do FIRST?

A.

Validate the scope and impact with the business process owner.

B.

Initiate the incident response plan.

C.

Review and validate the rules within the DLP system.

D.

Escalate the issue to senior management.

Full Access
Question # 259

Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?

A.

Create a security exception.

B.

Perform a gap analysis to determine needed resources.

C.

Perform a vulnerability assessment.

D.

Assess the risk to business operations.

Full Access
Question # 260

What should be the FIRST step when implementing data loss prevention (DLP) technology?

A.

Perform due diligence with vendor candidates.

B.

Build a business case.

C.

Classify the organization's data.

D.

Perform a cost-benefit analysis.

Full Access
Question # 261

Which of the following should be considered FIRST when recovering a compromised system that needs a complete rebuild?

A.

Patch management files

B.

Network system logs

C.

Configuration management files

D.

Intrusion detection system (IDS) logs

Full Access
Question # 262

Which of the following is MOST important for the improvement of a business continuity plan (BCP)?

A.

Incorporating lessons learned

B.

Implementing an IT resilience solution

C.

Implementing management reviews

D.

Documenting critical business processes

Full Access
Question # 263

Which of the following should have the MOST influence on the development of information security policies?

A.

Business strategy

B.

Past and current threats

C.

IT security framework

D.

Industry standards

Full Access
Question # 264

During which phase of an incident response plan is the root cause determined?

A.

Recovery

B.

Lessons learned

C.

Containment

D.

Eradication

Full Access
Question # 265

Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?

A.

Legal

B.

Information security

C.

Help desk

D.

Human resources (HR)

Full Access
Question # 266

Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?

A.

Demonstrating the program's value to the organization

B.

Discussing governance programs found in similar organizations

C.

Providing the results of external audits

D.

Providing examples of information security incidents within the organization

Full Access
Question # 267

Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?

A.

Risk assessment program

B.

Information security awareness training

C.

Information security governance

D.

Information security metrics

Full Access
Question # 268

Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?

A.

A security information and event management (SIEM) system

B.

An intrusion prevention system (IPS)

C.

A virtual private network (VPN) with multi-factor authentication (MFA)

D.

An identity and access management (IAM) system

Full Access
Question # 269

Which of the following is a function of the information security steering committee?

A.

Deliver external communication during incident response.

B.

Align the security framework with security standards.

C.

Align security strategy with business objectives.

D.

Monitor regulatory requirements.

Full Access
Question # 270

Which of the following provides an information security manager with the MOST accurate indication of the organization's ability to respond to a cyber attack?

A.

Walk-through of the incident response plan

B.

Black box penetration test

C.

Simulated phishing exercise

D.

Red team exercise

Full Access
Question # 271

Which of the following BEST enables an information security manager to obtain organizational support for the implementation of security controls?

A.

Conducting periodic vulnerability assessments

B.

Communicating business impact analysis (BIA) results

C.

Establishing effective stakeholder relationships

D.

Defining the organization's risk management framework

Full Access
Question # 272

The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:

A.

cause fewer potential production issues.

B.

require less IT staff preparation.

C.

simulate real-world attacks.

D.

identify more threats.

Full Access
Question # 273

What will BEST facilitate the success of new security initiatives?

A.

Establish an IT security steering committee.

B.

Include business in security decision making.

C.

Update security policies on a regular basis

D.

Monitor post-implementation security metrics.

Full Access
Question # 274

Which of the following is MOST helpful in determining the criticality of an organization's business functions?

A.

Disaster recovery plan (DRP)

B.

Business impact analysis (BIA)

C.

Business continuity plan (BCP)

D.

Security assessment report (SAR)

Full Access
Question # 275

Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?

A.

Lack of knowledgeable personnel

B.

Lack of communication processes

C.

Lack of process documentation

D.

Lack of alignment with organizational goals

Full Access
Question # 276

Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?

A.

Implement compensating controls.

B.

Communicate consequences for future instances.

C.

Enhance the data loss prevention (DLP) solution.

D.

Improve the security awareness training program.

Full Access
Question # 277

A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?

A.

Update in accordance with the best business practices.

B.

Perform a risk assessment of the current IT environment.

C.

Gain an understanding of the current business direction.

D.

Inventory and review current security policies.

Full Access
Question # 278

Who is BEST suited to determine how the information in a database should be classified?

A.

Database analyst

B.

Database administrator (DBA)

C.

Information security analyst

D.

Data owner

Full Access
Question # 279

An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager's FIRST step?

A.

Provide additional training to the incident response team.

B.

Review the incident management procedures.

C.

Interview the incident response team.

D.

Remove the steps from the incident management procedures.

Full Access
Question # 280

Which of the following is MOST important for an information security manager to consider when developing a business continuity plan (BCP) for ransomware attacks?

A.

Backups are maintained offline and regularly tested.

B.

Impacted networks can be detached at the network switch level.

C.

Production data is continuously replicated between primary and secondary sites.

D.

Backups are maintained on multiple sites and regularly reviewed.

Full Access
Question # 281

Which of the following is the MOST effective way to demonstrate alignment of information security strategy with business objectives?

A.

Balanced scorecard

B.

Risk matrix

C.

Benchmarking

D.

Heat map

Full Access
Question # 282

To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:

A.

rely on senior management to enforce security.

B.

promote the relevance and contribution of security.

C.

focus on compliance.

D.

reiterate the necessity of security.

Full Access
Question # 283

The PRIMARY consideration when responding to a ransomware attack should be to ensure:

A.

backups are available.

B.

the most recent patches have been applied.

C.

the ransomware attack is contained

D.

the business can operate

Full Access
Question # 284

Which of the following is MOST important for building 4 robust information security culture within an organization?

A.

Mature information security awareness training across the organization

B.

Strict enforcement of employee compliance with organizational security policies

C.

Security controls embedded within the development and operation of the IT environment

D.

Senior management approval of information security policies

Full Access
Question # 285

Threat and vulnerability assessments are important PRIMARILY because they are:

A.

used to establish security investments

B.

the basis for setting control objectives.

C.

elements of the organization's security posture.

D.

needed to estimate risk.

Full Access
Question # 286

Which of the following is the MOST important consideration when updating procedures for managing security devices?

A.

Updates based on the organization's security framework

B.

Notification to management of the procedural changes

C.

Updates based on changes m risk technology and process

D.

Review and approval of procedures by management

Full Access
Question # 287

Which of the following is an information security manager's MOST important course of action when responding to a major security incident that could disrupt the business?

A.

Follow the escalation process.

B.

Identify the indicators of compromise.

C.

Notify law enforcement.

D.

Contact forensic investigators.

Full Access
Question # 288

After the occurrence of a major information security incident, which of the following will BEST help an information security manager determine corrective actions?

A.

Calculating cost of the incident

B.

Conducting a postmortem assessment

C.

Performing an impact analysis

D.

Preserving the evidence

Full Access
Question # 289

Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?

A.

Define policies and standards for data processing.

B.

Implement applicable privacy principles

C.

Assess local or regional regulations

D.

Research cyber insurance policies

Full Access
Question # 290

Which of the following would BEST mitigate accidental data loss events?

A.

Conduct periodic user awareness training.

B.

Obtain senior management support for the information security strategy.

C.

Conduct a data loss prevention (DLP) audit.

D.

Enforce a data hard drive encryption policy.

Full Access
Question # 291

Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?

A.

Monitor the effectiveness of controls

B.

Update the risk assessment framework

C.

Review the inherent risk level

D.

Review the risk probability and impact

Full Access