Certified Information Security Manager Questions and Answers
An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?
The resilience requirements of an application are BEST determined by:
Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?
Of the following, who would provide the MOST relevant input when aligning the information security strategy with organizational goals?
An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?
Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
Which of the following should be the NEXT step after a security incident has been reported?
If the investigation of an incident is not completed within the time allocated in the incident response plan, which of the following actions should be taken by the incident response team?
Which of the following is MOST important to the effectiveness of an information security program?
When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be defined in the business continuity plan (BCP) to manage this requirement?
Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?
Which of the following is MOST important to include in monthly information security reports to the board?
Which of the following will BEST enable an effective information asset classification process?
An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?
While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?
When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:
Which type of plan is PRIMARILY intended to reduce the potential impact of security events that may occur?
Which of the following would BEST justify continued investment in an information security program?
Which of the following is the MOST important consideration when developing an approach to effectively contain security incidents?
In addition to executive sponsorship and business alignment, which of the following is MOST critical for information security governance?
Threat and vulnerability assessments are important PRIMARILY because they are:
An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?
Which of the following is the PRIMARY reason for conducting an incident response tabletop exercise?
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
An incident management team is alerted ta a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
Which of the following messages would be MOST effective in obtaining senior management's commitment to information security management?
A business impact analysis (BIA) should be periodically executed PRIMARILY to:
Reverse lookups can be used to prevent successful:
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
Which of the following should be done NEXT following senior management's decision to comply with new personal data regulations that are much more stringent than those currently followed to avoid massive fines?
What should be the PRIMARY objective of an information security policy?
Which of the following would MOST effectively ensure that a new server is appropriately secured?
Which of the following is the PRIMARY role of the information security manager in application development?
Which of the following provides the BEST evidence that a newly implemented security awareness program has been effective?
Which of the following is a desired outcome of information security governance?
During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
Which of the following activities is MOST appropriate to conduct during the eradication phase of a cyber incident response?
Which of the following is the BEST indication of an effective information security awareness training program?
Which of the following is the BEST indication of information security strategy alignment with the “&
Which of the following is the PRIMARY benefit of an information security awareness training program?
Which of the following would be the BEST way to reduce the risk of disruption resulting from an emergency system change?
The contribution of recovery point objective (RPO) to disaster recovery is to:
An organization is experiencing a sharp increase in incidents related to phishing messages. The root cause is an outdated email filtering system that is no longer supported by the vendor. Which of the following should be the information security manager's FIRST course of action?
An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification for granting an exception to the policy?
Which of the following should be the PRIMARY basis for the development of a business case to obtain support for an information security project?
Which of the following is MOST important to ensure the alignment of an information security program with the organizational strategy?
Which of the following BEST indicates misalignment of security policies with business objectives?
Which of the following BEST indicates the effectiveness of the vendor risk management process?
Which of the following roles is MOST appropriate to determine access rights for specific users of an application?
What is the PRIMARY benefit to an organization when information security program requirements are aligned with employment and staffing processes?
Which of the following is MOST effective for communicating forward-looking trends within security reporting?
Which of the following is the PRIMARY responsibility of an information security governance committee?
An organization plans to implement a new e-commerce operation in a highly regulated market. Which of the following is MOST important to consider when updating the risk management strategy?
In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.
Before relying on this certification, it is MOST important that the information security manager confirms that the:
Which of the following is the BEST way to determine if an information security profile is aligned with business requirements?
Application data integrity risk is MOST directly addressed by a design that includes:
Which of the following should be the PRIMARY objective of an information security governance framework?
Which of the following is the BEST indicator of the maturity level of a vendor risk management process?
Which of the following is the BEST option to lower the cost to implement application security controls?
Which of the following should be updated FIRST when aligning the incident response plan with the corporate strategy?
Which of the following should be established FIRST when implementing an information security governance framework?
An organization would like to invest in a new emerging technology. Which of the following is MOST important for the information security manager to consider when evaluating its impact?
The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?
The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:
Which is following should be an information security manager's PRIMARY focus during the development of a critical system storing highly confidential data?
The PRIMARY objective of timely declaration of a disaster is to:
Which of the following is a prerequisite for formulating a business continuity plan (BCP)?
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
Which of the following is the GREATEST inherent risk when performing a disaster recovery plan (DRP) test?
Which of the following is MOST important for an information security manager to consider when developing a business continuity plan (BCP) for ransomware attacks?
Which of the following should be the PRIMARY outcome of an information security program?
Which of the following is the MOST important function of an information security steering committee?
An organization learns that a third party has outsourced critical functions to another external provider. Which of the following is the information security manager's MOST important course of action?
An organization is MOST likely to accept the risk of noncompliance with a new regulatory requirement when:
Which of the following is the BEST way to prevent insider threats?
Which of the following BEST indicates that information security governance and corporate governance are integrated?
Which of the following is the GREATEST challenge with assessing emerging risk in an organization?
Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?
Which of the following is the BEST indicator of an organization's information security status?
An information security manager has confirmed the organization's cloud provider has unintentionally published some of the organization's business data. Which of the following should be done NEXT?
An organization is strategizing on how to improve security awareness. Which of the following is MOST important to consider when developing this strategy?
Which of the following processes BEST supports the evaluation of incident response effectiveness?
Which of the following should be the PRIMARY objective for creating a culture of security within an organization?
Which of the following is the MOST effective way to help assure the integrity of an organization’s accounting system?
To prepare for a third-party forensics investigation following an incident involving malware, the incident response team should:
After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?
Which of the following has the GREATEST influence on an organization's information security strategy?
When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?
An email digital signature will:
The GREATEST benefit of an effective information security awareness program is the organization’s ability to:
The PRIMARY advantage of involving end users in continuity planning is that they:
A financial institution is planning to develop a new mobile application. Which of the following is the BEST time to begin assessments of the application's security compliance?
Which of the following is the BEST technical defense against unauthorized access to a corporate network through social engineering?
Capacity planning would prevent:
Which of the following is MOST important when responding to a major security incident?
Which of the following is MOST important to include in an information security status report to senior management?
A backdoor has been identified that enabled a cyberattack on an organization’s systems. Integrating which of the following into the software development life cycle would BEST enable the organization to mitigate similar attacks in the future?
Which of the following BEST enables an organization to evaluate the security posture of a cloud service?
A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?
If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:
Which of the following has the MOST influence on the information security investment process?
Which of the following is the GREATEST benefit of using AI tools in security operations?
Which of the following provides the BEST assurance that security policies are applied across business operations?
Which of the following has the GREATEST impact on the effectiveness of an organization’s security posture?
An information security team is investigating an alleged breach of an organization's network. Which of the following would be the BEST single source of evidence to review?
Which of the following is MOST important to include in an information security strategy?
The PRIMARY goal of a post-incident review should be to:
Which of the following is the MOST critical factor for information security program success?
Which of the following is BEST used to determine the maturity of an information security program?
Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?
What is the BEST way to inform senior management of the value of information security?
The MOST effective tools for responding to new and advanced attacks are those that detect attacks based on:
Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?
Which of the following is the BEST approach to make strategic information security decisions?
An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?
Which of the following BEST ensures information security governance is aligned with corporate governance?
Which of the following is the BEST indication of an effective information security program?
Which of the following will result in the MOST accurate controls assessment?
Which of the following is the MOST important outcome of a post-incident review?
Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?
An organization has acquired a new system with strict maintenance instructions and schedules. Where should this information be documented?
Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?
Which of the following BEST enables an organization to maintain legally admissible evidence7
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
When designing security controls, it is MOST important to:
An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:
Which of the following is MOST critical when creating an incident response plan?
When taking a risk-based approach to vulnerability management, which of the following is MOST important to consider when prioritizing a vulnerability?
Which of the following would BEST support the business case for an increase in the information security budget?
The MOST useful technique for maintaining management support for the information security program is:
Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?
Which of the following MUST be established to maintain an effective information security governance framework?
Which of the following is MOST important to have in place when conducting a security control assessment of a system?
Which of the following is the BEST way to obtain organization-wide support for an information security program?
Which of the following is an information security manager's MOST important course of action when responding to a major security incident that could disrupt the business?
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?
After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
A global organization is considering its geopolitical security risks. Which of the following is the information security manager's BEST approach?
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
The PRIMARY objective of performing a post-incident review is to:
To effectively manage an organization's information security risk, it is MOST important to:
To help ensure that an information security training program is MOST effective, its contents should be:
When drafting the corporate privacy statement for a public website, which of the following MUST be included?
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?
Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?
Which of the following BEST indicates that information assets are classified accurately?
Which of the following activities is designed to handle a control failure that leads to a breach?
A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?
The PRIMARY reason to properly classify information assets is to determine:
During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?
Which of the following is a PRIMARY function of an incident response team?
Which of the following is the MOST important issue in a penetration test?
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?
The PRIMARY purpose for conducting cybersecurity risk assessments is to:
The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:
An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?
The MOST important element in achieving executive commitment to an information security governance program is:
During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?
Which of the following BEST prepares a computer incident response team for a variety of information security scenarios?
Which of the following should be done FIRST when a SIEM flags a potential event?
Which of the following is the MOST important requirement for a successful security program?
Which of the following business units should own the data that populates an identity management system?
Which of the following should an information security manager do FIRST to address the risk associated with a new third-party cloud application that will not meet organizational security requirements?
The MAIN benefit of implementing a data loss prevention (DLP) solution is to:
Which of the following is the BEST indication of a mature information security program?
Which of the following BEST helps to ensure the effective execution of an organization's disaster recovery plan (DRP)?
In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?
Which of the following metrics is MOST appropriate for evaluating the incident notification process?
Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?
Which of the following factors would have the MOST significant impact on an organization's information security governance mode?
A new information security manager finds that the organization tends to use short-term solutions to address problems. Resource allocation and spending are not effectively tracked, and there is no assurance that compliance requirements are being met. What should be done FIRST to reverse this bottom-up approach to security?
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
The MOST appropriate time to conduct a disaster recovery test would be after:
What is the MOST important consideration when establishing metrics for reporting to the information security strategy committee?
Which of the following is MOST important for an information security manager to verify when selecting a third-party forensics provider?
Recovery time objectives (RTOs) are BEST determined by:
Which of the following BEST supports effective communication during information security incidents7
Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?
Management would like to understand the risk associated with engaging an Infrastructure-as-a-Service (laaS) provider compared to hosting internally. Which of the following would provide the BEST method of comparing risk scenarios?
Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
Which of the following BEST indicates the organizational benefit of an information security solution?
Which of the following is the BEST indication ofa successful information security culture?
An organization has remediated a security flaw in a system. Which of the following should be done NEXT?
Recommendations for enterprise investment in security technology should be PRIMARILY based on:
An organization has updated its business goals in the middle of the fiscal year to respond to changes in market conditions. Which of the following is MOST important for the information security manager to update in support of the new goals?
Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:
The PRIMARY advantage of single sign-on (SSO) is that it will:
Which of the following presents the GREATEST challenge to the recovery of critical systems and data following a ransomware incident?
An organization has identified IT failures in a call center application. Of the following, who should own this risk?
An organization has been penalized by regulatory authorities for failing to notify them of a major security breach that may have compromised customer data. Which of the following is MOST likely in need of review and updating to prevent similar penalties in the future?
Spoofing should be prevented because it may be used to:
Which of the following is the MOST effective defense against malicious insiders compromising confidential information?
Which of the following is MOST important to include in a post-incident review following a data breach?
Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?
An information security manager is alerted to multiple security incidents across different business units, with unauthorized access to sensitive data and potential data exfiltration from critical systems. Which of the following is the BEST course of action to appropriately classify and prioritize these incidents?
Which of the following is the PRIMARY benefit of training service desk staff to recognize incidents?
Which of the following is the MOST important security consideration when planning to use a cloud service provider in a different country?
Which of the following is the BEST justification for making a revision to a password policy?
Which is MOST important to identify when developing an effective information security strategy?
An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?
Which of the following is MOST important for the effective implementation of an information security governance program?
Which of the following is MOST important for building 4 robust information security culture within an organization?
Which of the following would BEST help to ensure appropriate security controls are built into software?
Which of the following tools would be MOST helpful to an incident response team?
Which of the following change management procedures is MOST likely to cause concern to the information security manager?
Which of the following is the MOST effective way to convey information security responsibilities across an organization?
An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?
Recovery time objectives (RTOs) are an output of which of the following?
When evaluating vendors for sensitive data processing, which of the following should be the FIRST step to ensure the correct level of information security is provided?
Following an employee security awareness training program, what should be the expected outcome?
Which of the following should be the PRIMARY basis for determining the value of assets?
Which of the following sources is MOST useful when planning a business-aligned information security program?
While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?
Which of the following is the MOST effective way to increase security awareness in an organization?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
An information security manager finds that a soon-to-be deployed online application will increase risk beyond acceptable levels, and necessary controls have not been included. Which of the following is the BEST course of action for the information security manager?
Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?
A new type of ransomware has infected an organization's network. Which of the following would have BEST enabled the organization to detect this situation?
Which of the following is MOST helpful in determining an organization's current capacity to mitigate risks?
When defining a security baseline, it is MOST important that the baseline:
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?
When establishing metrics for an information security program, the BEST approach is to identify indicators that:
Which of the following should be the PRIMARY objective when establishing a new information security program?
Who is BEST suited to determine how the information in a database should be classified?
The PRIMARY purpose for continuous monitoring of security controls is to ensure:
Which of the following backup methods requires the MOST time to restore data for an application?
Which of the following is the BEST way lo monitor for advanced persistent threats (APT) in an organization?
Which of the following is the PRIMARY objective of a cyber resilience strategy?
An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?
Which of the following is the MOST important reason for an information security manager to archive and retain the organization's electronic communication and email data?
Which of the following provides an information security manager with the MOST accurate indication of the organization's ability to respond to a cyber attack?
Which of the following metrics BEST demonstrates the effectiveness of an organization's security awareness program?
Which of the following provides an information security manager with the MOST useful information on new threats and emerging risks that could impact business objectives?
An organization engages a third-party vendor to monitor and support a financial application under scrutiny by regulators. Which of the following controls would MOST effectively manage risk to the organization?
Which of the following is the MOST important factor in successfully implementing Zero Trust?
What should an information security manager verify FIRST when reviewing an information asset management program?
Which of the following BEST enables an organization to operate smoothly with reduced capacities when service has been disrupted?
Which of the following would provide the BEST evidence to senior management that security control performance has improved?
When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?
Who should be responsible for determining the level of data classification required for an application related to a new line of business?
Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?
Which of the following is the BEST course of action when using a web application that has known vulnerabilities?
The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:
An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?
Which of the following presents the GREATEST challenge to a large multinational organization using an automated identity and access management (1AM) system?
Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?
Which of the following BEST demonstrates the added value of an information security program?
The executive management of a domestic organization has announced plans to expand operations to multiple international locations. Which of the following should be the information security manager's FIRST step upon learning of these plans?
Data classification is PRIMARILY the responsibility of:
Of the following, who is BEST positioned to approve specific information security risk treatment options?
The effectiveness of an incident response team will be GREATEST when:
The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness training program is to include:
Relationships between critical systems are BEST understood by
An organization has just updated its backup capability to a new cloud-based solution. Which of the following tests will MOST effectively verify this change is working as intended?
Which of the following should an information security manager do FIRST when there is a conflict between the organization's information security policy and a local regulation?
A global organization is planning to expand its operations into a new country with stricter data protection regulations than those in the headquarters' home country. Which of the following is the BEST approach for adopting these new requirements?
Which of the following is the MOST effective way to ensure information security policies are understood?
To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:
Which of the following is the MOST important reason for logging firewall activity?
Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?
Which of the following will ensure confidentiality of content when accessing an email system over the Internet?
A Seat a-hosting organization's data center houses servers, appli
BEST approach for developing a physical access control policy for the organization?
What is the PRIMARY objective of implementing standard security configurations?
An information security manager developing an incident response plan MUST ensure it includes:
Which of the following is the PRIMARY reason for granting a security exception?
Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?
Prior to implementing a bring your own device (BYOD) program, it is MOST important to:
An organization has discovered that a server processing real-time visual data could be vulnerable to a lateral movement stage in a ransomware attack. Which of the following controls BEST mitigates this vulnerability?
Which of the following is MOST important to convey to employees in building a security risk-aware culture?
Which of the following is the BEST method to ensure compliance with password standards?
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?
An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?
A recovery point objective (RPO) is required in which of the following?
A PRIMARY benefit of adopting an information security framework is that it provides:
Which of the following is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?
When investigating an information security incident, details of the incident should be shared:
An information security manager has become aware that a third-party provider is not in compliance with the statement of work (SOW). Which of the following is the BEST course of action?
To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:
Which of the following will have the GREATEST influence on the successful adoption of an information security governance program?
To ensure that a new application complies with information security policy, the BEST approach is to:
A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?
Which of the following is a PRIMARY benefit of managed security solutions?
Which of the following is the MOST effective way to ensure the security of services and solutions delivered by third-party vendors?
Which of the following is the MOST critical activity for an information security manager to perform periodically throughout the term of a contract with an outsourced third party?
Which of the following would BEST enable the timely execution of an incident response plan?
The PRIMARY goal when conducting post-incident reviews is to identify:
Which of the following is the MOST important consideration when determining which type of failover site to employ?
Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?
An organization recently updated and published its information security policy and standards. What should the information security manager do NEXT?
Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?
An employee who is a remote user has copied financial data from the corporate server to a laptop using virtual private network (VPN) connectivity. Which of the following is the MOST important factor to determine if it should be classified as a data leakage incident?
An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?
Which of the following is an information security manager's BEST course of action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?
Which of the following should be the PRIMARY goal of information security?