Which of the following BEST enables an organization to effectively manage emerging cyber risk?
Which of the following is MOST important for an information security manager to consider when identifying information security resource requirements?
A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?
Which of the following is the BEST way to determine the effectiveness of an incident response plan?
Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?
Which of the following is the BEST indicator of a successful intrusion into an organization's systems?
Which of the following BEST enables the assignment of risk and control ownership?
Which of the following is the MOST effective defense against malicious insiders compromising confidential information?
Following a risk assessment, an organization has made the decision to adopt a bring your own device (BYOD) strategy. What should the information security manager do NEXT?
A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?
Which of the following should be done FIRST when a SIEM flags a potential event?
Which of the following is the MOST critical consideration when shifting IT operations to an Infrastructure as a Service (laaS) model hosted in a foreign country?
When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?
When drafting the corporate privacy statement for a public website, which of the following MUST be included?
Which of the following would BEST ensure that security risk assessment is integrated into the life cycle of major IT projects?
For the information security manager, integrating the various assurance functions of an organization is important PRIMARILY to enable:
An information security manager has been tasked with developing materials to update the board, regulatory agencies, and the media about a security incident. Which of the following should the information security manager do FIRST?
When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?
Which of the following is the MOST important consideration when updating procedures for managing security devices?
An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?
A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?
In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or
To ensure that a new application complies with information security policy, the BEST approach is to:
Which of the following processes is MOST important for the success of a business continuity plan (BCP)?
Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?
Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?
Which of the following is the PRIMARY role of the information security manager in application development?
The PRIMARY purpose for continuous monitoring of security controls is to ensure:
Which of the following BEST indicates that an information security governance framework has been successfully implemented?
Which of the following would be of GREATEST assistance in determining whether to accept residual risk of a critical security system?
Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?
Which of the following should an information security manager do FIRST upon learning that a competitor has experienced a ransomware attack?
An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?
Which of the following is the MOST effective way to ensure information security policies are understood?
An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?
An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?
When an organization experiences a disruptive event, the business continuity plan (BCP) should be triggered PRIMARILY based on:
Which of the following should be the PRIMARY focus of a status report on the information security program to senior management?
Which of the following is the BEST reason for senior management to support a business case for developing a monitoring system for a critical application?
An organization provides notebook PCs, cable wire locks, smartphone access, and virtual private network (VPN) access to its remote employees. Which of the following is MOST important for the information security manager to ensure?
Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?
Which of the following should include contact information for representatives of equipment and software vendors?
The MOST important element in achieving executive commitment to an information security governance program is:
A new regulatory requirement affecting an organization's information security program is released. Which of the following should be the information security manager's FIRST course of action?
What should a global information security manager do FIRST when informed that a new regulation with significant impact will go into effect soon?
Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?
While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?
Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
A technical vulnerability assessment on a personnel information management server should be performed when:
Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?
How would the information security program BEST support the adoption of emerging technologies?
A security incident has been reported within an organization. When should an information security manager contact the information owner?
When developing a categorization method for security incidents, the categories MUST:
Which of the following is a function of the information security steering committee?
An organization is leveraging tablets to replace desktop computers shared by shift-based staff These tablets contain critical business data and are inherently at increased risk of theft Which of the following will BEST help to mitigate this risk''
A penetration test against an organization's external web application shows several vulnerabilities. Which of the following presents the GREATEST concern?
Which of the following should be the FIRST step in patch management procedures when receiving an emergency security patch?
Which of the following BEST enables the restoration of operations after a limited ransomware incident occurs?
A recent audit found that an organization's new user accounts are not set up uniformly. Which of the following is MOST important for the information security manager to review?
An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?
An organization's automated security monitoring tool generates an excessively large amount of falsq positives. Which of the following is the BEST method to optimize the monitoring process?
An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?
The MOST useful technique for maintaining management support for the information security program is:
Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?
Which of the following would be MOST useful to help senior management understand the status of information security compliance?
In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?
Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?
Which of the following is MOST important when developing an information security strategy?
Which of the following BEST indicates the organizational benefit of an information security solution?
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
A software vendor has announced a zero-day vulnerability that exposes an organization's critical business systems. The vendor has released an emergency patch. Which of the following should be the information security managers PRIMARY concern?
What should an information security manager verify FIRST when reviewing an information asset management program?
An organization has identified a large volume of old data that appears to be unused. Which of the following should the information
security manager do NEXT?
A common drawback of email software packages that provide native encryption of messages is that the encryption:
An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?
Which of the following analyses will BEST identify the external influences to an organization's information security?
Which of the following should be an information security manager's FIRST course of action when a newly introduced privacy regulation affects the business?
Which of the following should be the PRIMARY objective of an information security governance framework?
Which of the following should be the MOST important consideration of business continuity management?
Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?
Which of the following is the GREATEST inherent risk when performing a disaster recovery plan (DRP) test?
Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?
Which of the following defines the triggers within a business continuity plan (BCP)? @
When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?
Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?
An organization's HR department requires that employee account privileges be removed from all corporate IT systems within three days of termination to comply with a government regulation However, the systems all have different user directories, and it currently takes up to four weeks to remove the privileges Which of the following would BEST enable regulatory compliance?
Which of the following should be the FIRST step in developing an information security strategy?
Which of the following change management procedures is MOST likely to cause concern to the information security manager?
While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?
Which of the following is the MOST effective way to prevent information security incidents?
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?
Which of the following is the BEST indication of information security strategy alignment with the “&
During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:
A Seat a-hosting organization's data center houses servers, appli
BEST approach for developing a physical access control policy for the organization?
Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?
Which of the following is the MOST important detail to capture in an organization's risk register?
Implementing the principle of least privilege PRIMARILY requires the identification of:
Which of the following BEST enables the integration of information security governance into corporate governance?
When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?
Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:
An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
Which of the following is MOST effective for communicating forward-looking trends within security reporting?
A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
Which risk is introduced when using only sanitized data for the testing of applications?
An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
Which of the following would BEST help to ensure appropriate security controls are built into software?
Which of the following is the MOST effective way to demonstrate alignment of information security strategy with business objectives?
Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?
Which of the following is the MOST important requirement for a successful security program?
Which of the following would BEST justify continued investment in an information security program?
Which of the following roles is BEST able to influence the security culture within an organization?
Which of the following BEST facilitates an information security manager's efforts to obtain senior management commitment for an information security program?
An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?
Which of the following BEST enables an organization to transform its culture to support information security?
Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
An organization is aligning its incident response capability with a public cloud service provider. What should be the information security manager's FIRST course of action?
Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?
Which of the following is MOST helpful for aligning security operations with the IT governance framework?
Which of the following sources is MOST useful when planning a business-aligned information security program?
Which of the following is the BEST tool to monitor the effectiveness of information security governance?
An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?
An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?
A risk assessment exercise has identified the threat of a denial of service (DoS) attack Executive management has decided to take no further action related to this risk. The MO ST likely reason for this decision is
An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification for granting an exception to the policy?
Which of the following is the MOST critical factor for information security program success?
Data entry functions for a web-based application have been outsourced to a third-party service provider who will work from a remote site Which of the following issues would be of GREATEST concern to an information security manager?
What should be an information security manager's MOST important consideration when developing a multi-year plan?
An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?
Which of the following BEST determines the allocation of resources during a security incident response?
The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?
Which of the following desired outcomes BEST supports a decision to invest in a new security initiative?
Which of the following should be the PRIMARY basis for an information security strategy?
What is the PRIMARY benefit to an organization when information security program requirements are aligned with employment and staffing processes?
Which of the following activities is designed to handle a control failure that leads to a breach?
Which of the following MUST happen immediately following the identification of a malware incident?
Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?
Which of the following is MOST important to include in a post-incident review following a data breach?
An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?
Which of the following should be the MOST important consideration when establishing information security policies for an organization?
An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?
In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:
An information security manager developing an incident response plan MUST ensure it includes:
Which of the following will BEST facilitate the integration of information security governance into enterprise governance?
Security administration efforts will be greatly reduced following the deployment of which of the following techniques?
Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?
Which of the following is the MOST important consideration when establishing an organization's information security governance committee?
Which of the following is the FIRST step to establishing an effective information security program?
Which of the following messages would be MOST effective in obtaining senior management's commitment to information security management?
Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?
The BEST way to identify the risk associated with a social engineering attack is to:
An organization needs to comply with new security incident response requirements. Which of the following should the information security manager do FIRST?
Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?
An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?
Who is BEST suited to determine how the information in a database should be classified?
Which of the following BEST indicates that information assets are classified accurately?
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
Which of the following tasks should be performed once a disaster recovery plan (DRP) has been developed?
Which of the following is MOST important for building 4 robust information security culture within an organization?
The PRIMARY benefit of introducing a single point of administration in network monitoring is that it:
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
Which of the following is the PRIMARY reason for granting a security exception?
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
Which of the following BEST supports the incident management process for attacks on an organization's supply chain?
Which of the following is a desired outcome of information security governance?
Which of the following is the BEST evidence of alignment between corporate and information security governance?
An online bank identifies a successful network attack in progress. The bank should FIRST:
If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:
During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?
Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?
An information security manager learns of a new standard related to an emerging technology the organization wants to implement. Which of the following should the information security manager recommend be done FIRST?
An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?
Which of the following is the BEST approach for governing noncompliance with security requirements?
Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?
Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
Which of the following is MOST helpful in determining an organization's current capacity to mitigate risks?
Which of the following is the BEST indication ofa successful information security culture?
Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
When properly implemented, secure transmission protocols protect transactions:
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
When developing an asset classification program, which of the following steps should be completed FIRST?
Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?
When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?
Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?
The effectiveness of an information security governance framework will BEST be enhanced if:
Which of the following should be the PRIMARY objective of the information security incident response process?
Which of the following would be MOST helpful to identify worst-case disruption scenarios?
A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?
Which of the following is the MOST important reason to conduct interviews as part of the business impact analysis (BIA) process?
An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:
Which of the following should be the PRIMARY area of focus when mitigating security risks associated with emerging technologies?
Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?
Which of the following provides the BEST assurance that security policies are applied across business operations?
Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?
An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
When investigating an information security incident, details of the incident should be shared:
Which of the following processes BEST supports the evaluation of incident response effectiveness?
Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?
Which of the following is the BEST approach for managing user access permissions to ensure alignment with data classification?
Which of the following should be the PRIMARY consideration when developing an incident response plan?
Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?
What should be the FIRST step when an Internet of Things (loT) device in an organization's network is confirmed to have been hacked?
Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?
An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?