After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?
An organization has purchased an Internet sales company to extend the sales department. The information security manager's FIRST step to ensure the security policy framework encompasses the new business model is to:
Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?
Which of the following BEST determines the data retention strategy and subsequent policy for an organization?
Which of the following is a prerequisite for formulating a business continuity plan (BCP)?
An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?
ACISO learns that a third-party service provider did not notify the organization of a data breach that affected the service provider's data center. Which of the following should the CISO do FIRST?
A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?
Which of the following is the MOST critical consideration when shifting IT operations to an Infrastructure as a Service (laaS) model hosted in a foreign country?
A global organization is considering its geopolitical security risks. Which of the following is the information security manager's BEST approach?
An organization is strategizing on how to improve security awareness. Which of the following is MOST important to consider when developing this strategy?
Which is the BEST method to evaluate the effectiveness of an alternate processing site when continuous uptime is required?
Which of the following is the BEST indication of an effective disaster recovery planning process?
Which of the following BEST determines the allocation of resources during a security incident response?
A financial institution is planning to develop a new mobile application. Which of the following is the BEST time to begin assessments of the application's security compliance?
Which of the following will BEST enable an organization to meet incident response requirements when outsourcing its incident response function?
When developing an asset classification program, which of the following steps should be completed FIRST?
Which of the following is MOST important for the improvement of a business continuity plan (BCP)?
Which of the following should be given the HIGHEST priority during an information security post-incident review?
Which of the following is the BEST way to ensure data is not co-mingled or exposed when using a cloud service provider?
Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?
An organization faces severe fines and penalties if not in compliance with local regulatory requirements by an established deadline. Senior management has asked the information security manager to prepare an action plan to achieve compliance.
Which of the following would provide the MOST useful information for planning purposes? »
What should be the FIRST step when an Internet of Things (loT) device in an organization's network is confirmed to have been hacked?
Which of the following is the PRIMARY advantage of an organization using Disaster Recovery as a Service (DRaaS) to help manage its disaster recovery program?
Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?
An organization provides notebook PCs, cable wire locks, smartphone access, and virtual private network (VPN) access to its remote employees. Which of the following is MOST important for the information security manager to ensure?
Which of the following is MOST important to ensure incident management readiness?
Which of the following is the PRIMARY reason for conducting an incident response tabletop exercise?
An organization engages a third-party vendor to monitor and support a financial application under scrutiny by regulators. Which of the following controls would MOST effectively manage risk to the organization?
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
Senior management is concerned about data exposure through the use of public Al services. Which of the following is the information security manager's BEST course of action?
Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?
Which of the following is the BEST strategy when determining an organization’s approach to risk treatment?
Who has the PRIMARY authority to decide if additional risk treatments are required to mitigate an identified risk?
Which of the following is the MOST important outcome of effective risk treatment?
Which of the following BEST helps to ensure a third-party backup site continues to meet the organization’s information security standards?
To effectively manage an organization's information security risk, it is MOST important to:
Which of the following is the PRIMARY preventive method to mitigate risks associated with privileged accounts?
An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:
Who is accountable for approving an information security governance framework?
Which of the following is the MOST important requirement for a successful security program?
Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?
When assigning a risk owner, the MOST important consideration is to ensure the owner has:
A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?
Which of the following is the BEST reason to implement an information security architecture?
A business impact analysis (BIA) BEST enables an organization to establish:
The PRIMARY purpose of implementing information security governance metrics is to:
An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?
Which of the following would be MOST helpful to identify worst-case disruption scenarios?
An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?
Which of the following is a desired outcome of information security governance?
An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?
Which of the following is necessary to ensure consistent protection for an organization's information assets?
Which of the following is MOST important to ensure the alignment of an information security program with the organizational strategy?
Which of the following is MOST helpful in determining the criticality of an organization's business functions?
Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?
The PRIMARY purpose for continuous monitoring of security controls is to ensure:
During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:
A newly appointed information security manager of a retailer with multiple stores discovers an HVAC (heating, ventilation, and air conditioning) vendor has remote access to the stores to enable real-time monitoring and equipment diagnostics. Which of the following should be the information security manager's FIRST course of action?
An organization has just updated its backup capability to a new cloud-based solution. Which of the following tests will MOST effectively verify this change is working as intended?
Which of the following is the BEST indication ofa successful information security culture?
Which of the following tasks should be performed once a disaster recovery plan (DRP) has been developed?
When defining a security baseline, it is MOST important that the baseline:
Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?
An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?
Which of the following is the MOST effective way to convey information security responsibilities across an organization?
Which of the following is MOST important when conducting a forensic investigation?
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
Which of the following is the MOST effective way to demonstrate improvement in security performance?
Which of the following would BEST help to ensure appropriate security controls are built into software?
Which of the following is the MOST important consideration when briefing executives about the current state of the information security program?
When updating the information security policy to accommodate a new regulation, the information security manager should FIRST:
Once a suite of security controls has been successfully implemented for an organization's business units, it is MOST important for the information security manager to:
An organization's automated security monitoring tool generates an excessively large amount of falsq positives. Which of the following is the BEST method to optimize the monitoring process?
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager's FIRST step in addressing the issue should be to:
Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?
Which of the following is the MOST important consideration when developing an approach to effectively contain security incidents?
An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?
An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?
An organization needs to comply with new security incident response requirements. Which of the following should the information security manager do FIRST?
An organization's HR department requires that employee account privileges be removed from all corporate IT systems within three days of termination to comply with a government regulation However, the systems all have different user directories, and it currently takes up to four weeks to remove the privileges Which of the following would BEST enable regulatory compliance?
Which of the following has the MOST influence on the information security investment process?
Which of the following has the GREATEST impact on the ability to successfully execute a disaster recovery plan (DRP)?
Which of the following should an information security manager do FIRST when a vulnerability has been disclosed?
After the occurrence of a major information security incident, which of the following will BEST help an information security manager determine corrective actions?
Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?
Which of the following would BEST enable the timely execution of an incident response plan?
A business impact analysis (BIA) should be periodically executed PRIMARILY to:
Which of the following is MOST important to include in a post-incident review following a data breach?
Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?
An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?
Which of the following security initiatives should be the FIRST step in helping an organization maintain compliance with privacy regulations?
During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?
Which of the following roles is BEST able to influence the security culture within an organization?
The MOST effective tools for responding to new and advanced attacks are those that detect attacks based on:
Which of the following is MOST important to include in an information security strategy?
An information security manager has been notified that two senior executives have the ability to elevate their own privileges in the corporate accounting system, in violation of policy. What is the FIRST step to address this issue?
Which of the following is the MOST important consideration when determining which type of failover site to employ?
Which of the following should be the PRIMARY focus of a status report on the information security program to senior management?
Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?
Which of the following would MOST effectively ensure that a new server is appropriately secured?
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
Which of the following should be an information security manager's PRIMARY concern when an organization is expanding business to a new country?
Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?
Which of the following is the MOST important reason to involve external forensics experts in evidence collection when responding to a major security breach?
Which of the following should an information security manager do FIRST when developing an organization's disaster recovery plan (DRP)?
Which of the following is the PRIMARY reason for granting a security exception?
Which of the following is the BEST approach for governing noncompliance with security requirements?
Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:
Which of the following presents the GREATEST challenge to a security operations center's wna GY of potential security breaches?
An incident handler is preparing a forensic image of a hard drive. Which of the following MUST be done to provide evidence that the image is an exact copy of the original?
Which of the following provides an information security manager with the MOST useful information on new threats and emerging risks that could impact business objectives?
An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?
The contribution of recovery point objective (RPO) to disaster recovery is to:
During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?
When management changes the enterprise business strategy which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?
Which of the following is the MOST important factor of a successful information security program?
When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?
An organization has identified a weakness in the ability of its employees to identify and report cybersecurity incidents. Although training materials have been provided, employees show a lack of interest. Which of the following is the information security manager’s BEST course of action?
Which of the following is an information security manager's BEST course of action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?
Which of the following roles has the PRIMARY responsibility to ensure the operating effectiveness of IT controls?
An organization recently updated and published its information security policy and standards. What should the information security manager do NEXT?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
Which of the following BEST enables an organization to maintain legally admissible evidence7
Which of the following should be done FIRST after a ransomware incident has been successfully contained?
Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?
For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?
Which of the following MUST happen immediately following the identification of a malware incident?
The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:
An organization's quality process can BEST support security management by providing:
Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?
When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?
Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?
Which of the following should an information security manager do FIRST after identifying suspicious activity on a PC that is not in the organization's IT asset inventory?
Which of the following metrics would provide an accurate measure of an information security program's performance?
Which of the following is MOST important to have in place when conducting a security control assessment of a system?
Which of the following is the BEST approach for addressing noncompliance with security standards?
Which of the following is MOST important to the successful implementation of an information security program?
After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?
An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?
The MOST important information for influencing management’s support of information security is:
An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?
In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:
A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?
Which of the following is MOST relevant for an information security manager to communicate to the board of directors?
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be in the business continuity plan (BCP) to manage this requirement?
When building support for an information security program, which of the following elements is MOST important?
Prior to implementing a bring your own device (BYOD) program, it is MOST important to:
Which type of policy BEST helps to ensure that all employees, contractors, and third-party users receive formal communication regarding an organization’s security program?
When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?
Which of the following is the PRIMARY responsibility of the information security function when an organization adopts emerging technologies?
An organization uses a security standard that has undergone a major revision by the certifying authority. The old version of the standard will no longer be used for organizations wishing to maintain their certifications. Which of the following should be the FIRST
course of action?
Which of the following should be done FIRST when developing a business continuity plan (BCP)?
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?
Which of the following BEST enables the integration of information security governance into corporate governance?
To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?
Which of the following should be done FIRST when implementing a security program?
An information security team has started work to mitigate findings from a recent penetration test. Which of the following presents the GREATEST risk to the organization?
An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:
• A bad actor broke into a business-critical FTP server by brute forcing an administrative password
• The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
• The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
• After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail
Which of the following could have been prevented by conducting regular incident response testing?
Which of the following is MOST helpful in determining an organization's current capacity to mitigate risks?
During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?
What is the information security steering committee’s PRIMARY role in the development of security policies?
Which of the following business units should own the data that populates an identity management system?
Which of the following is the MOST important consideration when updating procedures for managing security devices?
An anomaly-based intrusion detection system (IDS) operates by gathering data on:
Which of the following BEST enables an organization to maintain an appropriate security control environment?
A project team member notifies the information security manager of a potential security risk that has not been included in the risk register. Which of the following should the information security manager do FIRST?
Which of the following has the GREATEST impact on efforts to improve an organization's security posture?
Senior management has just accepted the risk of noncompliance with a new regulation What should the information security manager do NEX*P
A department has reported that a security control is no longer effective. Which of the following is the information security manager's BEST course of action?
An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?
Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?
Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?
How would the information security program BEST support the adoption of emerging technologies?
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
The MAIN benefit of implementing a data loss prevention (DLP) solution is to:
An organization is considering using a third party to host sensitive archived data. Which of the following is MOST important to verify before entering into the relationship?
An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?
An information security manager is assessing security risk associated with a cloud service provider. Which of the following is the MOST appropriate reference to consult when performing this assessment?
Which of the following is MOST important to determine following the discovery and eradication of a malware attack?
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be defined in the business continuity plan (BCP) to manage this requirement?
Which of the following is the PRIMARY role of the information security manager in application development?
An organization has identified IT failures in a call center application. Of the following, who should own this risk?
Which of the following would be MOST useful to help senior management understand the status of information security compliance?
When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?
Which of the following eradication methods is MOST appropriate when responding to an incident resulting in malware on an application server?
Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?
Which of the following is the BEST option to lower the cost to implement application security controls?
Threat and vulnerability assessments are important PRIMARILY because they are:
Which of the following should be established FIRST when implementing an information security governance framework?
In which cloud model does the cloud service buyer assume the MOST security responsibility?
An organization recently outsourced the development of a mission-critical business application. Which of the following would be the BEST way to test for the existence of backdoors?
When analyzing the emerging risk and threat landscape, an information security manager should FIRST:
Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?
Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?
Of the following, who is in the BEST position to evaluate business impacts?
Which of the following is an example of a change to the external threat landscape?
Which of the following is MOST important for the information security manager to include when presenting changes in the security risk profile to senior management?
To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:
Which of the following is the BEST justification for making a revision to a password policy?
Which of the following is the BEST reason to implement a comprehensive information security management system?
To ensure continuous alignment with the organizational strategy
To gain senior management support for the information security program
To support identification of key risk indicators (KRIs)
How does an incident response team BEST leverage the results of a business impact analysis (BIA)?
An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?
When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:
Which of the following is the BEST method to ensure compliance with password standards?
Which of the following is the MOST effective way to identify changes in an information security environment?
Which of the following factors would have the MOST significant impact on an organization's information security governance mode?
Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?
After a server has been attacked, which of the following is the BEST course of action?
Which of the following is the BEST way lo monitor for advanced persistent threats (APT) in an organization?
The PRIMARY benefit of introducing a single point of administration in network monitoring is that it:
Which of the following is MOST helpful to identify whether information security policies have been followed?
An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:
Senior management wants to thoroughly test a disaster recovery plan (DRP) for a mission-critical system. Which of the following would provide the MOST reliable results?
What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?
Which of the following BEST indicates the organizational benefit of an information security solution?
Which of the following BEST enables an organization to transform its culture to support information security?
Which of the following BEST demonstrates the added value of an information security program?
Which of the following metrics BEST demonstrates the effectiveness of an organization's security awareness program?
Which of the following is the MOST critical input to developing policies, standards, and procedures to secure information assets?
Which of the following analyses will BEST identify the external influences to an organization's information security?
Which of the following is a PRIMARY function of an incident response team?
Which of the following BEST facilitates an information security manager's efforts to obtain senior management commitment for an information security program?
Which of the following would BEST ensure that security is integrated during application development?
Which of the following is the MOST important consideration during the design phase of a business impact analysis (BIA)?
Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?
Which of the following provides the BEST evidence that a newly implemented security awareness program has been effective?
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?
To improve the efficiency of the development of a new software application, security requirements should be defined:
An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?
An information security manager has been tasked with developing materials to update the board, regulatory agencies, and the media about a security incident. Which of the following should the information security manager do FIRST?
Which of the following is MOST important to consider when determining asset valuation?
Which of the following should be an information security manager s MOST important consideration when determining the priority for implementing security controls?
Which or the following is MOST important to consider when determining backup frequency?
Which of the following is the MOST effective way to demonstrate alignment of information security strategy with business objectives?
Which of the following BEST enables users to recover from ransomware or malware attacks?
In addition to executive sponsorship and business alignment, which of the following is MOST critical for information security governance?
Which of the following BEST facilitates effective strategic alignment of security initiatives?
Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?
Which of the following BEST demonstrates that an anti-phishing campaign is effective?
Which of the following is MOST important when designing an information security governance framework?
When deciding to move to a cloud-based model, the FIRST consideration should be:
Which of the following is MOST likely to reduce the effectiveness of a SIEM system?
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
An organization is leveraging tablets to replace desktop computers shared by shift-based staff These tablets contain critical business data and are inherently at increased risk of theft Which of the following will BEST help to mitigate this risk''
Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?
Which of the following provides the BEST input to determine the level of protection needed for an IT system?
A new risk has been identified in a high availability system. The BEST course of action is to:
To inform a risk treatment decision, which of the following should the information security manager compare with the organization's risk appetite?
A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?
An information security manager has confirmed the organization's cloud provider has unintentionally published some of the organization's business data. Which of the following should be done NEXT?
To support effective risk decision making, which of the following is MOST important to have in place?
An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
Which of the following is the MOST important reason to consider organizational culture when developing an information security program?
Which of the following would BEST guide the development and maintenance of an information security program?
Which of the following is the MOST important factor in an organization's selection of a key risk indicator (KRI)?
Which of the following processes is MOST important for the success of a business continuity plan (BCP)?
Which of the following has the GREATEST impact on the effectiveness of an organization’s security posture?
What is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?
Of the following, who would provide the MOST relevant input when aligning the information security strategy with organizational goals?
To help ensure that an information security training program is MOST effective, its contents should be:
Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?
In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?
Which of the following is the BEST approach for managing user access permissions to ensure alignment with data classification?
Which risk is introduced when using only sanitized data for the testing of applications?
Of the following, who should be assigned as the owner of a newly identified risk related to an organization's new payroll system?
Which of the following is MOST effective in gaining support for the information security strategy from senior management?
Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?
Which of the following would BEST address the risk of a system failing to detect a breach?
Which of the following is the MOST effective way to ensure information security policies are understood?
Which of the following would BEST enable the help desk to recognize an information security incident?
Which of the following is the MOST important consideration when attempting to create a security-focused culture?
The MOST useful technique for maintaining management support for the information security program is:
As part of incident response activities, the BEST time to begin the recovery process is after:
Which of the following should be done FIRST when a SIEM flags a potential event?
An information security manager is alerted to multiple security incidents across different business units, with unauthorized access to sensitive data and potential data exfiltration from critical systems. Which of the following is the BEST course of action to appropriately classify and prioritize these incidents?
An information security manager is updating the organization's incident response plan. Which of the following is the BEST way to validate that the process and procedures provided by IT and business units are complete, accurate, and known by all responsible teams?
An organization has an ongoing security awareness training program. Employee participation has been decreasing over the year, while the number of malware and phishing incidents from email has been increasing. What is the information security manager's BEST course of action?