Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?
Embedding security responsibilities into job descriptions is important PRIMARILY because it:
Which of the following activities MUST be performed by an information security manager for change requests?
Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?
In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?
Which type of system is MOST effective for prioritizing cyber incidents based on impact and tracking them until they are closed?
Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?
Which of the following has the GREATEST impact on efforts to improve an organization's security posture?
Application data integrity risk is MOST directly addressed by a design that includes:
An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?
A global organization is considering its geopolitical security risks. Which of the following is the information security manager's BEST approach?
Which of the following is MOST important to include in an information security status report to senior management?
Which of the following is the BEST way to compete for funding for an information security program in an organization with limited resources?
An organization provides notebook PCs, cable wire locks, smartphone access, and virtual private network (VPN) access to its remote employees. Which of the following is MOST important for the information security manager to ensure?
The PRIMARY purpose for continuous monitoring of security controls is to ensure:
Which of the following is the MOST important reason for obtaining input from risk owners when implementing controls?
An employee clicked on a link in a phishing email, triggering a ransomware attack Which of the following should be the information security?
To help ensure that an information security training program is MOST effective, its contents should be:
Which of the following is the MOST important reason for logging firewall activity?
Which of the following would be MOST helpful when creating information security policies?
Which of the following is MOST important to consider when aligning a security awareness program with the organization's business strategy?
Which of the following is the BEST option to lower the cost to implement application security controls?
When investigating an information security incident, details of the incident should be shared:
A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?
Which of the following BEST enables an information security manager to obtain organizational support for the implementation of security controls?
Which of the following roles has the PRIMARY responsibility to ensure the operating effectiveness of IT controls?
From a business perspective, the GREATEST benefit of an incident response plan is that it:
An organization's research department plans to apply machine learning algorithms on a large data set containing customer names and purchase history. The risk of personal data leakage is considered high impact. Which of the following is the BEST risk treatment option in this situation?
Several months after the installation of a new firewall with intrusion prevention features to block malicious activity, a breach was discovered that came in through the firewall shortly after installation. This breach could have been detected earlier by implementing firewall:
An organization is implementing an information security governance framework. To communicate the program's effectiveness to stakeholders, it is MOST important to establish:
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
Which of the following is the MOST effective way to ensure information security policies are understood?
Which type of recovery site is MOST reliable and can support stringent recovery requirements?
Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?
An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?
Which of the following is the MOST important consideration when determining which type of failover site to employ?
If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:
The MOST important information for influencing management’s support of information security is:
Which of the following is MOST helpful for protecting an enterprise from advanced persistent threats (APTs)?
Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?
When collecting admissible evidence, which of the following is the MOST important requirement?
A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?
Of the following, who is BEST suited to own the risk discovered in an application?
Which of the following business units should own the data that populates an identity management system?
Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
An organization permits the storage and use of its critical and sensitive information on employee-owned smartphones. Which of the following is the BEST security control?
Which of the following metrics is MOST appropriate for evaluating the incident notification process?
When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?
What should an information security manager do FIRST when an organization is planning to use a third-party cloud computing service for a critical business process?
When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?
An information security manager is MOST likely to obtain approval for a new security project when the business case provides evidence of:
Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?
Which of the following should an information security manager do FIRST to address the risk associated with a new third-party cloud application that will not meet organizational security requirements?
In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:
Which of the following is CRITICAL to ensure the appropriate stakeholder makes decisions during a cybersecurity incident?
Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?
Management has announced the acquisition of a new company. The information security manager of the parent company is concerned that conflicting access rights may cause critical information to be exposed during the integration of the two companies. To BEST address this concern, the information security manager should:
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?
Which of the following is the BEST starting point for a newly hired information security manager who has been tasked with identifying and addressing network vulnerabilities?
Which of the following should be established FIRST when implementing an information security governance framework?
Which of the following is MOST important when conducting a forensic investigation?
Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?
Which of the following is MOST important when designing an information security governance framework?
An organization has acquired a new system with strict maintenance instructions and schedules. Where should this information be documented?
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
Which of the following is MOST important for an information security manager to consider when developing a business continuity plan (BCP) for ransomware attacks?
Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its cloud services.
Which of the following should be the PRIMARY focus of Company A's information security manager?
Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?
An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?
Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?
Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?
Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?
An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?
Which of the following is MOST appropriate to communicate to senior management regarding information risk?
Which of the following is the MOST important function of an information security steering committee?
A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?
An organization has just updated its backup capability to a new cloud-based solution. Which of the following tests will MOST effectively verify this change is working as intended?
While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?
What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?
Which of the following is MOST important to include in an information security strategy?
Implementing the principle of least privilege PRIMARILY requires the identification of:
While responding to a high-profile security incident, an information security manager observed several deficiencies in the current incident response plan. When would be the BEST time to update the plan?
An information security team has confirmed that threat actors are taking advantage of a newly announced critical vulnerability within an application. Which of the following should be done
FIRST?
Which of the following analyses will BEST identify the external influences to an organization's information security?
When analyzing the emerging risk and threat landscape, an information security manager should FIRST:
In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or
Which of the following is MOST important to ensuring that incident management plans are executed effectively?
Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?
An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?
Which of the following is the BEST indication of an effective information security program?
Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
Which of the following metrics provides the BEST evidence of alignment of information security governance with corporate governance?
Which of the following should be the MOST important consideration when establishing information security policies for an organization?
Which of the following is MOST important when developing an information security strategy?
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
Which of the following is MOST important to determine following the discovery and eradication of a malware attack?
Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?
Who is accountable for approving an information security governance framework?
Which of the following would BEST ensure that security is integrated during application development?
Which of the following is the MOST important objective of post-incident review activities?
Which of the following is the MOST important consideration when briefing executives about the current state of the information security program?
Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?
To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?
Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?
Which of the following should be the NEXT step after a security incident has been reported?
Which of the following is the BEST method to ensure compliance with password standards?
Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?
Which of the following is the PRIMARY objective of a cyber resilience strategy?
Which of the following is the PRIMARY reason to conduct a post-incident review?
Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?
When integrating security risk management into an organization it is MOST important to ensure:
When developing a categorization method for security incidents, the categories MUST:
A multinational organization is introducing a security governance framework. The information security manager's concern is that regional security practices differ. Which of the following should be evaluated FIRST?
Which of the following parties should be responsible for determining access levels to an application that processes client information?
An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?
An information security manager learns of a new standard related to an emerging technology the organization wants to implement. Which of the following should the information security manager recommend be done FIRST?
An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager's FIRST step?
Which of the following is MOST important when responding to a major security incident?
Prior to conducting a forensic examination, an information security manager should:
When determining an acceptable risk level which of the following is the MOST important consideration?
Which of the following is the MOST effective way to demonstrate alignment of information security strategy with business objectives?
Which of the following should an information security manager do FIRST when noncompliance with security standards is identified?
Which of the following processes is MOST important for the success of a business continuity plan (BCP)?
Which of the following is the MOST important requirement for a successful security program?
Which is following should be an information security manager's PRIMARY focus during the development of a critical system storing highly confidential data?
Which of the following BEST protects against emerging advanced persistent threat (APT) actors?
Which of the following is the BEST justification for making a revision to a password policy?
An information security manager has identified that security risks are not being treated in a timely manner. Which of the following
Which of the following BEST enables an organization to provide ongoing assurance that legal and regulatory compliance requirements can be met?
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
Which of the following BEST minimizes information security risk in deploying applications to the production environment?
An organization has determined that fixing a security vulnerability in a critical application is too costly to be feasible, but the impact is material to the business. Which of the following is the MOST appropriate risk treatment?
Which of the following BEST helps to enable the desired information security culture within an organization?
Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?
Which of the following is MOST important to maintain integration among the incident response plan, business continuity plan (BCP). and disaster recovery plan (DRP)?
When developing an asset classification program, which of the following steps should be completed FIRST?
Which of the following is MOST helpful in determining an organization's current capacity to mitigate risks?
Which of the following should be the PRIMARY objective of the information security incident response process?
Which of the following is MOST important for an information security manager to consider when reviewing a security investment plan?
Which of the following is MOST important to the effectiveness of an information security steering committee?
Which of the following is MOST important when designing security controls for new cloud-based services?
Senior management is concerned about data exposure through the use of public Al services. Which of the following is the information security manager's BEST course of action?
Which of the following is MOST important for the effective implementation of an information security governance program?
Of the following, who would provide the MOST relevant input when aligning the information security strategy with organizational goals?
When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?
Which of the following should be the PRIMARY basis for determining the value of assets?
An organization's information security manager reads on social media that a recently purchased vendor product has been compromised and customer data has been posted online. What should the information security manager do FIRST?
Which of the following is the BEST way to help ensure alignment of the information security program with organizational objectives?
Which of the following BEST prepares a computer incident response team for a variety of information security scenarios?
An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?
Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?
Which of the following is MOST important in increasing the effectiveness of incident responders?
Which of the following is the MOST effective way to detect security incidents?
An organization has purchased an Internet sales company to extend the sales department. The information security manager's FIRST step to ensure the security policy framework encompasses the new business model is to:
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
An organization has identified a large volume of old data that appears to be unused. Which of the following should the information
security manager do NEXT?
Which of the following BEST indicates misalignment of security policies with business objectives?
An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:
The department head of application development has decided to accept the risks identified in a recent assessment. No recommendations will be implemented, even though the recommendations are required by regulatory oversight. What should the information security manager do NEXT?
Which of the following would BEST ensure that security risk assessment is integrated into the life cycle of major IT projects?
Which of the following BEST supports investments in an information security program?
Which of the following is MOST important to have in place as a basis for developing an effective information security program that supports the organization's business goals?
Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?
Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?
Which of the following provides the MOST effective response against ransomware attacks?
Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?
The BEST way to integrate information security governance with corporate governance is to ensure:
Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?
Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?
Which of the following is the BEST way to determine the gap between the present and desired state of an information security program?
Which of the following is the PRIMARY responsibility of the information security function when an organization adopts emerging technologies?
Which of the following is the BEST tool to monitor the effectiveness of information security governance?
Which of the following would BEST support the business case for an increase in the information security budget?
An organization is planning to outsource network management to a service provider. Including which of the following in the contract would be the MOST effective way to mitigate information security risk?
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
What should be an information security manager's FIRST step when developing a business case for a new intrusion detection system (IDS) solution?
What is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?
When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?
While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?
The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:
What should be an information security manager's MOST important consideration when developing a multi-year plan?
Which of the following should be done FIRST when a SIEM flags a potential event?
Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?
Data entry functions for a web-based application have been outsourced to a third-party service provider who will work from a remote site Which of the following issues would be of GREATEST concern to an information security manager?
An organization is MOST likely to accept the risk of noncompliance with a new regulatory requirement when:
An organization learns that a third party has outsourced critical functions to another external provider. Which of the following is the information security manager's MOST important course of action?
Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?
The PRIMARY consideration when responding to a ransomware attack should be to ensure:
Which of the following is the MOST effective way to identify changes in an information security environment?
Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?
An organization has an ongoing security awareness training program. Employee participation has been decreasing over the year, while the number of malware and phishing incidents from email has been increasing. What is the information security manager's BEST course of action?
To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:
Which of the following BEST enables an organization to operate smoothly with reduced capacities when service has been disrupted?
Which of the following is the FIRST step in developing a business continuity plan (BCP)?
Which of the following is the BEST reason for senior management to support a business case for developing a monitoring system for a critical application?
A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:
Which of the following is the MOST critical input to developing policies, standards, and procedures to secure information assets?
An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?
Which of the following is the FIRST step when conducting a post-incident review?
Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?
How does an incident response team BEST leverage the results of a business impact analysis (BIA)?
Which of the following will ensure confidentiality of content when accessing an email system over the Internet?
Which of the following is the GREATEST benefit of using AI tools in security operations?
To ensure that a new application complies with information security policy, the BEST approach is to:
Which type of policy BEST helps to ensure that all employees, contractors, and third-party users receive formal communication regarding an organization’s security program?
The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:
Which of the following should be of GREATEST concern to an information security manager when evaluating a cloud service provider?
Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?
A security incident has been reported within an organization. When should an information security manager contact the information owner?
A risk assessment exercise has identified the threat of a denial of service (DoS) attack Executive management has decided to take no further action related to this risk. The MO ST likely reason for this decision is
Once a suite of security controls has been successfully implemented for an organization's business units, it is MOST important for the information security manager to:
Which of the following would provide the BEST evidence to senior management that security control performance has improved?
Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?
Which of the following provides an information security manager with the MOST accurate indication of the organization's ability to respond to a cyber attack?
Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?
During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?
Which of the following is the PRIMARY objective of testing security controls within a critical infrastructure?
An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?
Which of the following BEST facilitates the effective execution of an incident response plan?
Which of the following should be the PRIMARY objective when establishing a new information security program?
An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?
An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?
What type of control is being implemented when a security information and event management (SIEM) system is installed?
Which of the following sources is MOST useful when planning a business-aligned information security program?
The contribution of recovery point objective (RPO) to disaster recovery is to:
An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?
Which of the following is the MOST effective way to convey information security responsibilities across an organization?
An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:
To support effective risk decision making, which of the following is MOST important to have in place?
Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?
The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?
An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:
Which of the following is the GREATEST benefit of performing a tabletop exercise of the business continuity plan (BCP)?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
When assigning a risk owner, the MOST important consideration is to ensure the owner has:
Which of the following is MOST important to consider when defining control objectives?
Which of the following is the BEST indication of an effective information security awareness training program?
Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?
The effectiveness of an information security governance framework will BEST be enhanced if:
Which of the following metrics would provide an accurate measure of an information security program's performance?
When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:
Which of the following should have the MOST influence on an organization's response to a new industry regulation?
Which of the following is the BEST control to protect customer personal information that is stored in the cloud?
Which of the following is an information security manager's BEST course of action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?
Which of the following is established during the preparation phase of an incident response plan?
ACISO learns that a third-party service provider did not notify the organization of a data breach that affected the service provider's data center. Which of the following should the CISO do FIRST?
An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?
An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?
Which of the following is the MOST effective defense against malicious insiders compromising confidential information?
What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?
When an organization experiences a disruptive event, the business continuity plan (BCP) should be triggered PRIMARILY based on:
A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
Which of the following is MOST important to consider when determining asset valuation?
Which of the following is MOST helpful for determining which information security policies should be implemented by an organization?
Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?
To effectively manage an organization's information security risk, it is MOST important to: