Which of the following is MOST important to consider when determining asset valuation?
Which of the following is the MOST important factor of a successful information security program?
Which of the following is MOST important in increasing the effectiveness of incident responders?
Which of the following BEST supports information security management in the event of organizational changes in security personnel?
Which of the following BEST enables staff acceptance of information security policies?
In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.
Before relying on this certification, it is MOST important that the information security manager confirms that the:
Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?
Which of the following will BEST facilitate the integration of information security governance into enterprise governance?
Which of the following is the PRIMARY reason to perform regular reviews of the cybersecurity threat landscape?
In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:
Which of the following will have the GREATEST influence on the successful adoption of an information security governance program?
Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?
Which of the following is the BEST indicator of an organization's information security status?
Which of the following processes BEST supports the evaluation of incident response effectiveness?
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
Which of the following is the BEST indication of an effective information security awareness training program?
Which of the following is an information security manager's MOST important course of action when responding to a major security incident that could disrupt the business?
Which of the following would be MOST helpful to identify worst-case disruption scenarios?
Which of the following BEST indicates that information assets are classified accurately?
An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:
Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?
IT projects have gone over budget with too many security controls being added post-production. Which of the following would MOST help to ensure that relevant controls are applied to a project?
Which of the following parties should be responsible for determining access levels to an application that processes client information?
Which of the following is MOST critical when creating an incident response plan?
An organization recently outsourced the development of a mission-critical business application. Which of the following would be the BEST way to test for the existence of backdoors?
How does an incident response team BEST leverage the results of a business impact analysis (BIA)?
What should be the FIRST step when an Internet of Things (loT) device in an organization's network is confirmed to have been hacked?
An information security manager learns of a new standard related to an emerging technology the organization wants to implement. Which of the following should the information security manager recommend be done FIRST?
When deciding to move to a cloud-based model, the FIRST consideration should be:
Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?
Which of the following BEST ensures information security governance is aligned with corporate governance?
ACISO learns that a third-party service provider did not notify the organization of a data breach that affected the service provider's data center. Which of the following should the CISO do FIRST?
Security administration efforts will be greatly reduced following the deployment of which of the following techniques?
Which of the following BEST supports the incident management process for attacks on an organization's supply chain?
The PRIMARY advantage of involving end users in continuity planning is that they:
Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?
Which of the following is the FIRST step to establishing an effective information security program?
Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?
Which of the following is the PRIMARY role of an information security manager in a software development project?
Which of the following is MOST helpful for determining which information security policies should be implemented by an organization?
In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
Which of the following BEST indicates that information security governance and corporate governance are integrated?
Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?
Which of the following is an information security manager's BEST course of action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?
Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?
Which of the following is a desired outcome of information security governance?
An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.
Which of the following should be given immediate focus?
An incident management team is alerted ta a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?
An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?
Which of the following should be the PRIMARY objective of the information security incident response process?
Which of the following is the BEST evidence of alignment between corporate and information security governance?
Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?
Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?
Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?
Which of the following tasks should be performed once a disaster recovery plan (DRP) has been developed?
Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?
The MOST important reason for having an information security manager serve on the change management committee is to:
An online bank identifies a successful network attack in progress. The bank should FIRST:
An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
Which of the following provides the BEST assurance that security policies are applied across business operations?
Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?
Which of the following messages would be MOST effective in obtaining senior management's commitment to information security management?
An organization needs to comply with new security incident response requirements. Which of the following should the information security manager do FIRST?
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?
Management decisions concerning information security investments will be MOST effective when they are based on:
A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?
An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?
The PRIMARY purpose for continuous monitoring of security controls is to ensure:
What is the MOST important consideration when establishing metrics for reporting to the information security strategy committee?
Which of the following is MOST helpful in the development of a cost-effective information security strategy that is aligned with business requirements?
Which of the following is the BEST indication of a mature information security program?
Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?
Which of the following is MOST important to include in an information security status report to senior management?
Which of the following is MOST important when developing an information security strategy?
The PRIMARY reason for creating a business case when proposing an information security project is to:
An organization has remediated a security flaw in a system. Which of the following should be done NEXT?
An information security program is BEST positioned for success when it is closely aligned with:
Which of the following is the BEST reason to implement a comprehensive information security management system?
To ensure continuous alignment with the organizational strategy
To gain senior management support for the information security program
To support identification of key risk indicators (KRIs)
Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?
Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?
Senior management has just accepted the risk of noncompliance with a new regulation What should the information security manager do NEX*P
A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?
Which of the following is the MOST important objective when planning an incident response program?
Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?
A recent application security assessment identified a number of low- and medium-level vulnerabilities. Which of the following stakeholders is responsible for deciding the appropriate risk treatment option?
Which of the following will BEST enable an effective information asset classification process?
Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?
Which of the following is the MOST important consideration when updating procedures for managing security devices?
Which of the following is the MOST important consideration when briefing executives about the current state of the information security program?
Which of the following roles is MOST appropriate to determine access rights for specific users of an application?
Which of the following is the MOST effective way to determine the alignment of an information security program with the business strategy?
A data loss prevention (DLP) tool has flagged personally identifiable information (Pll) during transmission. Which of the following should the information security manager do FIRST?
Which of the following would be MOST useful to help senior management understand the status of information security compliance?
A project team member notifies the information security manager of a potential security risk that has not been included in the risk register. Which of the following should the information security manager do FIRST?
Which of the following is the BEST indication of an effective disaster recovery planning process?
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
An information security manager is working to incorporate media communication procedures into the security incident communication plan. It would be MOST important to include:
Which of the following control types should be considered FIRST for aligning employee behavior with an organization's information security objectives?
Which of the following should be the FIRST step in developing an information security strategy?
Which of the following is MOST appropriate to communicate to senior management regarding information risk?
Which of the following would MOST effectively ensure that a new server is appropriately secured?
An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization's critical systems?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
Which of the following is the BEST course of action when an information security manager identifies that systems are vulnerable to emerging threats?
Who has the PRIMARY authority to decide if additional risk treatments are required to mitigate an identified risk?
Which of the following processes is MOST important for the success of a business continuity plan (BCP)?
Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?
A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?
An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?
Which of the following is the BEST way to compete for funding for an information security program in an organization with limited resources?
Which of the following is the BEST justification for making a revision to a password policy?
While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?
Prior to implementing a bring your own device (BYOD) program, it is MOST important to:
Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?
An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:
An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
The PRIMARY purpose of implementing information security governance metrics is to:
Which of the following is the BEST indication that an organization has integrated information security governance with corporate governance?
Which of the following is MOST appropriate to communicate to senior management regarding information risk?
The information security manager of a multinational organization has been asked to consolidate the information security policies of its regional locations. Which of the following would be of
GREATEST concern?
An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?
An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?
Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?
Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?
A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager's FIRST step in addressing the issue should be to:
Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
Which of the following should be an information security manager s MOST important consideration when determining the priority for implementing security controls?
Which of the following is the BEST option to lower the cost to implement application security controls?
To effectively manage an organization's information security risk, it is MOST important to:
Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?
Which of the following is the PRIMARY benefit of implementing an information security governance framework?
To ensure that a new application complies with information security policy, the BEST approach is to:
Which of the following is the MOST important outcome of effective risk treatment?
An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?
Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
Which of the following BEST facilitates the effective execution of an incident response plan?
Which of the following should be done FIRST when developing a business continuity plan (BCP)?
The MOST important element in achieving executive commitment to an information security governance program is:
Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?
Which of the following is the MOST important constraint to be considered when developing an information security strategy?
The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?
An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification for granting an exception to the policy?
When creating an incident response plan, the PRIMARY benefit of establishing a clear definition of a security incident is that it helps to:
An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?
Which of the following change management procedures is MOST likely to cause concern to the information security manager?
Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?
Which of the following is the BEST technical defense against unauthorized access to a corporate network through social engineering?
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
Which risk is introduced when using only sanitized data for the testing of applications?
Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?
Data entry functions for a web-based application have been outsourced to a third-party service provider who will work from a remote site Which of the following issues would be of GREATEST concern to an information security manager?
Which of the following presents the GREATEST challenge to the recovery of critical systems and data following a ransomware incident?
Which of the following roles is BEST able to influence the security culture within an organization?
Which of the following is the MOST critical factor for information security program success?
An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?
When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?
When collecting admissible evidence, which of the following is the MOST important requirement?
An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?
Which of the following is the MOST important reason for obtaining input from risk owners when implementing controls?
Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?
What should be an information security manager's MOST important consideration when developing a multi-year plan?
Which of the following has the MOST influence on the inherent risk of an information asset?
Which of the following is the BEST indication of effective information security governance?
Which of the following BEST enables an organization to provide ongoing assurance that legal and regulatory compliance requirements can be met?
Management has announced the acquisition of a new company. The information security manager of the parent company is concerned that conflicting access rights may cause critical information to be exposed during the integration of the two companies. To BEST address this concern, the information security manager should:
Which of the following is MOST important to include in monthly information security reports to the board?
Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?
Which of the following defines the triggers within a business continuity plan (BCP)? @
Which of the following desired outcomes BEST supports a decision to invest in a new security initiative?
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
An organization's disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?
A common drawback of email software packages that provide native encryption of messages is that the encryption:
Which of the following is MOST helpful for aligning security operations with the IT governance framework?
Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?
Which of the following is the MOST important detail to capture in an organization's risk register?
A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:
Which of the following BEST enables the integration of information security governance into corporate governance?
Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?
An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
Which of the following is the MOST effective way to prevent information security incidents?
An anomaly-based intrusion detection system (IDS) operates by gathering data on:
Which of the following is MOST effective in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application?
Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?
Which of the following backup methods requires the MOST time to restore data for an application?
Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?
What is the PRIMARY benefit to an organization that maintains an information security governance framework?
Which of the following is the PRIMARY objective of a business impact analysis (BIA)?
Which of the following is MOST effective for communicating forward-looking trends within security reporting?
Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?
To support effective risk decision making, which of the following is MOST important to have in place?
An organization faces severe fines and penalties if not in compliance with local regulatory requirements by an established deadline. Senior management has asked the information security manager to prepare an action plan to achieve compliance.
Which of the following would provide the MOST useful information for planning purposes? »
To help ensure that an information security training program is MOST effective its contents should be
Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?
An organization's HR department requires that employee account privileges be removed from all corporate IT systems within three days of termination to comply with a government regulation However, the systems all have different user directories, and it currently takes up to four weeks to remove the privileges Which of the following would BEST enable regulatory compliance?
A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?
A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
Which of the following is the BEST way to obtain support for a new organization-wide information security program?
To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:
An information security manager determines there are a significant number of exceptions to a newly released industry-required security standard. Which of the following should be done NEXT?
Which of the following is the BEST way to ensure the capability to restore clean data after a ransomware attack?
Which of the following BEST demonstrates the added value of an information security program?
A Seat a-hosting organization's data center houses servers, appli
BEST approach for developing a physical access control policy for the organization?
Implementing the principle of least privilege PRIMARILY requires the identification of:
An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?
Which of the following should an information security manager do FIRST when a mandatory security standard hinders the achievement of an identified business objective?
The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?
Which of the following MUST happen immediately following the identification of a malware incident?