During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
An organization is increasingly using Software as a Service (SaaS) to replace in-house hosting and support of IT applications. Which of the following would be the MOST effective way to help ensure procurement decisions consider information security concerns?
Which of the following will BEST facilitate the integration of information security governance into enterprise governance?
When investigating an information security incident, details of the incident should be shared:
Which of the following processes BEST supports the evaluation of incident response effectiveness?
In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:
Security administration efforts will be greatly reduced following the deployment of which of the following techniques?
Which of the following is MOST important to include in a post-incident review following a data breach?
An organization plans to offer clients a new service that is subject to regulations. What should the organization do FIRST when developing a security strategy in support of this new service?
Which of the following MUST happen immediately following the identification of a malware incident?
An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?
Which of the following is the BEST approach to make strategic information security decisions?
Which of the following is the PRIMARY role of an information security manager in a software development project?
An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:
Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?
Which of the following is the MOST important reason to conduct interviews as part of the business impact analysis (BIA) process?
Which of the following is the PRIMARY reason to perform regular reviews of the cybersecurity threat landscape?
Which of the following is MOST effective in monitoring an organization's existing risk?
Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?
Management decisions concerning information security investments will be MOST effective when they are based on:
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?
Which of the following is MOST important to consider when aligning a security awareness program with the organization's business strategy?
Which of the following should be the PRIMARY area of focus when mitigating security risks associated with emerging technologies?
An organization recently outsourced the development of a mission-critical business application. Which of the following would be the BEST way to test for the existence of backdoors?
Which of the following is a desired outcome of information security governance?
Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
An organization needs to comply with new security incident response requirements. Which of the following should the information security manager do FIRST?
Which of the following is the FIRST step to establishing an effective information security program?
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
Which of the following should be done FIRST when establishing a new data protection program that must comply with applicable data privacy regulations?
Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?
Which of the following BEST ensures information security governance is aligned with corporate governance?
When deciding to move to a cloud-based model, the FIRST consideration should be:
An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?
Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?
Which of the following is MOST appropriate for an organization to consider when defining incident classification and categorization levels?
Which of the following is the BEST approach for managing user access permissions to ensure alignment with data classification?
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?
Which of the following is MOST important when conducting a forensic investigation?
Which of the following is the MOST important characteristic of an effective information security metric?
The PRIMARY purpose of implementing information security governance metrics is to:
An information security manager is working to incorporate media communication procedures into the security incident communication plan. It would be MOST important to include:
A multinational organization is introducing a security governance framework. The information security manager's concern is that regional security practices differ. Which of the following should be evaluated FIRST?
Which of the following is MOST important for the information security manager to include when presenting changes in the security risk profile to senior management?
Which type of plan is PRIMARILY intended to reduce the potential impact of security events that may occur?
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
An information security manager learns of a new standard related to an emerging technology the organization wants to implement. Which of the following should the information security manager recommend be done FIRST?
Which of the following is the BEST way to ensure data is not co-mingled or exposed when using a cloud service provider?
Which of the following BEST indicates the organizational benefit of an information security solution?
Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?
Which type of policy BEST helps to ensure that all employees, contractors, and third-party users receive formal communication regarding an organization’s security program?
Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?
Senior management wants to thoroughly test a disaster recovery plan (DRP) for a mission-critical system. Which of the following would provide the MOST reliable results?
Which of the following is the BEST way to obtain organization-wide support for an information security program?
Which of the following is MOST helpful in determining the criticality of an organization's business functions?
Which of the following would BEST guide the development and maintenance of an information security program?
Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?
Which of the following eradication methods is MOST appropriate when responding to an incident resulting in malware on an application server?
Which of the following should be the PRIMARY focus of an organization with immature incident detection capabilities?
Which of the following should be the FIRST step in patch management procedures when receiving an emergency security patch?
Which of the following BEST indicates that an information security governance framework has been successfully implemented?
An information security manager has learned of an increasing trend in attacks that use phishing emails impersonating an organization's CEO in an attempt to commit wire transfer fraud. Which of the following is the BEST way to reduce the risk associated with this type of attack?
An organization is leveraging tablets to replace desktop computers shared by shift-based staff These tablets contain critical business data and are inherently at increased risk of theft Which of the following will BEST help to mitigate this risk''
A software vendor has announced a zero-day vulnerability that exposes an organization's critical business systems. The vendor has released an emergency patch. Which of the following should be the information security managers PRIMARY concern?
A recent audit found that an organization's new user accounts are not set up uniformly. Which of the following is MOST important for the information security manager to review?
Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?
Which of the following is the GREATEST challenge when developing key risk indicators (KRIs)?
Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?
Which of the following is the FIRST step when conducting a post-incident review?
Which of the following is the PRIMARY impact of organizational culture on the effectiveness of an information security program?
Which of the following should be the FIRST step when performing triage of a malware incident?
For the information security manager, integrating the various assurance functions of an organization is important PRIMARILY to enable:
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
Which of the following is the BEST indication of an effective information security program?
The MOST important element in achieving executive commitment to an information security governance program is:
An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?
Which of the following is the GREATEST benefit of using AI tools in security operations?
Which of the following would MOST effectively ensure that a new server is appropriately secured?
While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?
Which of the following should be the PRIMARY focus for an information security manager when reviewing access controls for data stored in an off-premise cloud environment?
Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?
Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?
Which of the following BEST enables an organization to identify and contain security incidents?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization's critical systems?
From a business perspective, the GREATEST benefit of an incident response plan is that it:
A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?
Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?
The MOST effective tools for responding to new and advanced attacks are those that detect attacks based on:
Which of the following provides the MOST useful information for identifying security control gaps on an application server?
Which of the following is the PRIMARY reason to conduct a post-incident review?
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
Which of the following is MOST important to have in place for an organization's information security program to be effective?
Which of the following is the BEST way to determine if an information security profile is aligned with business requirements?
A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?
Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?
Which of the following is the BEST indication of a mature information security program?
Which of the following is the BEST course of action when an information security manager identifies that systems are vulnerable to emerging threats?
Who is accountable for approving an information security governance framework?
To ensure that a new application complies with information security policy, the BEST approach is to:
Prior to implementing a bring your own device (BYOD) program, it is MOST important to:
An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?
Which is MOST important to identify when developing an effective information security strategy?
Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?
Of the following, who would provide the MOST relevant input when aligning the information security strategy with organizational goals?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
An organization is planning to outsource network management to a service provider. Including which of the following in the contract would be the MOST effective way to mitigate information security risk?
When determining an acceptable risk level which of the following is the MOST important consideration?
Which of the following events is MOST likely to require an organization to revisit its information security framework?
Which of the following BEST enables an incident response team to determine appropriate actions during an initial investigation?
Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:
Which of the following activities is MOST appropriate to conduct during the eradication phase of a cyber incident response?
Which type of backup BEST enables an organization to recover data after a ransomware attack?
Which of the following BEST enables an organization to continuously assess the information security risk posture?
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
Which of the following provides the BEST indication of the return on information security investment?
An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:
Which of the following presents the GREATEST challenge to the recovery of critical systems and data following a ransomware incident?
Which of the following defines the triggers within a business continuity plan (BCP)? @
An organization's disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?
Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?
Which of the following would BEST enable the timely execution of an incident response plan?
To help ensure that an information security training program is MOST effective its contents should be
Which of the following events would MOST likely require a revision to the information security program?
Which of the following has the GREATEST influence on an organization's information security strategy?
Data entry functions for a web-based application have been outsourced to a third-party service provider who will work from a remote site Which of the following issues would be of GREATEST concern to an information security manager?
A newly appointed information security manager of a retailer with multiple stores discovers an HVAC (heating, ventilation, and air conditioning) vendor has remote access to the stores to enable real-time monitoring and equipment diagnostics. Which of the following should be the information security manager's FIRST course of action?
Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?
The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness training program is to include:
An organization's HR department requires that employee account privileges be removed from all corporate IT systems within three days of termination to comply with a government regulation However, the systems all have different user directories, and it currently takes up to four weeks to remove the privileges Which of the following would BEST enable regulatory compliance?
Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?
Implementing the principle of least privilege PRIMARILY requires the identification of:
Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?
Prior to conducting a forensic examination, an information security manager should:
Which of the following is the MOST important detail to capture in an organization's risk register?
Which of the following has the MOST influence on the inherent risk of an information asset?
An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?
Which of the following desired outcomes BEST supports a decision to invest in a new security initiative?
Which of the following BEST enables an organization to transform its culture to support information security?
To support effective risk decision making, which of the following is MOST important to have in place?
Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?
A Seat a-hosting organization's data center houses servers, appli
BEST approach for developing a physical access control policy for the organization?
Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?
Which of the following backup methods requires the MOST time to restore data for an application?
Which of the following is MOST important to include in monthly information security reports to the board?
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
Which of the following BEST facilitates an information security manager's efforts to obtain senior management commitment for an information security program?
Which of the following should be the PRIMARY objective of an information security governance framework?
Which of the following is the BEST tool to monitor the effectiveness of information security governance?
Which of the following is MOST important for an information security manager to verify when selecting a third-party forensics provider?
Which of the following change management procedures is MOST likely to cause concern to the information security manager?
When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?
The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
An organization is aligning its incident response capability with a public cloud service provider. What should be the information security manager's FIRST course of action?
Which of the following should be the MOST important consideration of business continuity management?
Which of the following is MOST effective for communicating forward-looking trends within security reporting?
A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:
Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?
Which of the following should be an information security manager's FIRST course of action when a newly introduced privacy regulation affects the business?
Which of the following is the MOST effective way to prevent information security incidents?
An organization faces severe fines and penalties if not in compliance with local regulatory requirements by an established deadline. Senior management has asked the information security manager to prepare an action plan to achieve compliance.
Which of the following would provide the MOST useful information for planning purposes? »
Which of the following is the GREATEST value provided by a security information and event management (SIEM) system?
Which of the following is MOST important to convey to employees in building a security risk-aware culture?
A risk assessment exercise has identified the threat of a denial of service (DoS) attack Executive management has decided to take no further action related to this risk. The MO ST likely reason for this decision is
Which of the following analyses will BEST identify the external influences to an organization's information security?
Which of the following sources is MOST useful when planning a business-aligned information security program?
What is the PRIMARY benefit to an organization when information security program requirements are aligned with employment and staffing processes?
Which of the following should be the FIRST step in developing an information security strategy?
A common drawback of email software packages that provide native encryption of messages is that the encryption:
Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?
Which of the following documents should contain the INITIAL prioritization of recovery of services?
Which of the following is the BEST indication of effective information security governance?
When creating an incident response plan, the PRIMARY benefit of establishing a clear definition of a security incident is that it helps to:
Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?
Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?
Which of the following would BEST help to ensure appropriate security controls are built into software?
Which of the following should an information security manager do FIRST when a mandatory security standard hinders the achievement of an identified business objective?
Which of the following is the MOST important reason for obtaining input from risk owners when implementing controls?
The PRIMARY purpose for continuous monitoring of security controls is to ensure:
An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
What should be an information security manager's MOST important consideration when developing a multi-year plan?
Which of the following is the BEST indication of information security strategy alignment with the “&
When collecting admissible evidence, which of the following is the MOST important requirement?
Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?
Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?
During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:
To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:
Which of the following is the BEST method to ensure compliance with password standards?
Which of the following BEST determines the allocation of resources during a security incident response?
The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?
Which of the following is the BEST course of action when an online company discovers a network attack in progress?
Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?
When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
Which of the following should be the PRIMARY basis for an information security strategy?
An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?
Which of the following roles is BEST able to influence the security culture within an organization?
Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?
Which of the following activities is designed to handle a control failure that leads to a breach?
Which is the BEST method to evaluate the effectiveness of an alternate processing site when continuous uptime is required?
Which of the following is MOST important in increasing the effectiveness of incident responders?
Which of the following is the MOST important consideration when establishing an organization's information security governance committee?
Which of the following is an information security manager's BEST course of action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?
In which cloud model does the cloud service buyer assume the MOST security responsibility?
An organization is implementing an information security governance framework. To communicate the program's effectiveness to stakeholders, it is MOST important to establish:
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?
Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?
IT projects have gone over budget with too many security controls being added post-production. Which of the following would MOST help to ensure that relevant controls are applied to a project?
An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?
Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?
The PRIMARY advantage of involving end users in continuity planning is that they:
Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?
Which of the following is MOST important to consider when determining asset valuation?
Which of the following is the BEST course of action for an information security manager to align security and business goals?
Which of the following would be MOST helpful to identify worst-case disruption scenarios?
Which of the following should be the PRIMARY consideration when developing an incident response plan?
Which of the following is the BEST approach for governing noncompliance with security requirements?
Which of the following BEST supports information security management in the event of organizational changes in security personnel?
Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?
Which of the following should be the PRIMARY objective of the information security incident response process?
Which of the following activities MUST be performed by an information security manager for change requests?
An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?
In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?
An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?
An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?
Which of the following is the MOST important factor of a successful information security program?
An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.
Which of the following should be given immediate focus?
A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
What should be the FIRST step when an Internet of Things (loT) device in an organization's network is confirmed to have been hacked?
In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.
Before relying on this certification, it is MOST important that the information security manager confirms that the:
Which of the following should be the MOST important consideration when establishing information security policies for an organization?
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?
An online bank identifies a successful network attack in progress. The bank should FIRST:
Which of the following provides the BEST assurance that security policies are applied across business operations?
Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?
Which of the following is the BEST indication of an effective information security awareness training program?
Which of the following is the BEST indication ofa successful information security culture?
Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?
Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?