An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:
• A bad actor broke into a business-critical FTP server by brute forcing an administrative password
• The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
• The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
• After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail
Which of the following could have been prevented by conducting regular incident response testing?
The PRIMARY benefit of integrating information security activities into change management processes is to:
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
An information security manager has been notified that two senior executives have the ability to elevate their own privileges in the corporate accounting system, in violation of policy. What is the FIRST step to address this issue?
Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?
Which of the following is the PRIMARY benefit of an information security awareness training program?
Which of the following BEST minimizes information security risk in deploying applications to the production environment?
Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?
Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?
A global organization is planning to expand its operations into a new country with stricter data protection regulations than those in the headquarters' home country. Which of the following is the BEST approach for adopting these new requirements?
Which of the following should an information security manager do FIRST when a vulnerability has been disclosed?
An organization experienced a loss of revenue during a recent disaster. Which of the following would BEST prepare the organization to recover?
Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?
Which of the following is the GREATEST challenge when developing key risk indicators (KRIs)?
Which of the following is the PRIMARY responsibility of the information security function when an organization adopts emerging technologies?
A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?
An incident response team has established that an application has been breached. Which of the following should be done NEXT?
The BEST way to report to the board on the effectiveness of the information security program is to present:
Which of the following should be the FIRST step in patch management procedures when receiving an emergency security patch?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
Which of the following is MOST relevant for an information security manager to communicate to the board of directors?
Which of the following is the GREATEST value provided by a security information and event management (SIEM) system?
Which of the following BEST prepares a computer incident response team for a variety of information security scenarios?
An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification for granting an exception to the policy?
An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?
Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?
Which of the following has the MOST influence on the inherent risk of an information asset?
Which of the following is the PRIMARY reason to use a phased incident recovery approach?
Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
Which of the following would be MOST important to include in a proposal justifying investments for an organization's information security program?
Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?
An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization's critical systems?
If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:
Which of the following is the MOST important factor of a successful information security program?
Which of the following is MOST important to have in place when conducting a security control assessment of a system?
Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its cloud services.
Which of the following should be the PRIMARY focus of Company A's information security manager?
Which of the following is MOST important to consider when defining control objectives?
Which of the following BEST enables the restoration of operations after a limited ransomware incident occurs?
Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?
Which of the following is the BEST way to obtain organization-wide support for an information security program?
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
Which of the following change management procedures is MOST likely to cause concern to the information security manager?
When an organization experiences a disruptive event, the business continuity plan (BCP) should be triggered PRIMARILY based on:
During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?
Which of the following is MOST important when designing security controls for new cloud-based services?
The executive management of a domestic organization has announced plans to expand operations to multiple international locations. Which of the following should be the information security manager's FIRST step upon learning of these plans?
What is the role of the information security manager in finalizing contract negotiations with service providers?
A recent audit found that an organization's new user accounts are not set up uniformly. Which of the following is MOST important for the information security manager to review?
Which of the following is MOST helpful to identify whether information security policies have been followed?
What should be an information security manager's MOST important consideration when developing a multi-year plan?
When building support for an information security program, which of the following elements is MOST important?
Which of the following BEST facilitates the development of a comprehensive information security policy?
Which of the following is the MOST important function of an information security steering committee?
The PRIMARY reason for creating a business case when proposing an information security project is to:
An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?
Which of the following is the MOST appropriate risk response when the risk impact has been determined to be immaterial and the likelihood is very low?
Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?
Which of the following BEST enables an organization to transform its culture to support information security?
Which of the following BEST helps to ensure the effective execution of an organization's disaster recovery plan (DRP)?
Which of the following is the BEST indication of a mature information security program?
Which of the following is the BEST way to determine the gap between the present and desired state of an information security program?
Which of the following is MOST important to have in place for an organization's information security program to be effective?
An organization is performing due diligence when selecting a third party. Which of the following is MOST helpful to reduce the risk of unauthorized sharing of information during this process?
A project team member notifies the information security manager of a potential security risk that has not been included in the risk register. Which of the following should the information security manager do FIRST?
A new application has entered the production environment with deficient technical security controls. Which of the following is MOST Likely the root cause?
Which of the following should an information security manager do FIRST when noncompliance with security standards is identified?
Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?
Which of the following is the MOST effective way to demonstrate alignment of information security strategy with business objectives?
When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:
Which of the following BEST enables the assignment of risk and control ownership?
Which of the following BEST supports the incident management process for attacks on an organization's supply chain?
Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?
Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?
Which of the following is the BEST approach for data owners to use when defining access privileges for users?
Define access privileges based on user roles.
Adopt user account settings recommended by the vendor.
Perform a risk assessment of the users' access privileges.
Which of the following should be an information security manager's FIRST course of action when a newly introduced privacy regulation affects the business?
Which of the following BEST enables an organization to provide ongoing assurance that legal and regulatory compliance requirements can be met?
Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?
Which of the following would BEST ensure that security risk assessment is integrated into the life cycle of major IT projects?
The PRIMARY goal of the eradication phase in an incident response process is to:
A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?
Which of the following is MOST effective for communicating forward-looking trends within security reporting?
A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?
Which of the following is MOST important when conducting a forensic investigation?
Which of the following should be the PRIMARY basis for an information security strategy?
Which of the following is the MOST effective way to influence organizational culture to align with security guidelines?
A new risk has been identified in a high availability system. The BEST course of action is to:
Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?
Management would like to understand the risk associated with engaging an Infrastructure-as-a-Service (laaS) provider compared to hosting internally. Which of the following would provide the BEST method of comparing risk scenarios?
Prior to implementing a bring your own device (BYOD) program, it is MOST important to:
Which of the following is MOST important for building 4 robust information security culture within an organization?
To inform a risk treatment decision, which of the following should the information security manager compare with the organization's risk appetite?
Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?
Which of the following is the PRIMARY responsibility of an information security governance committee?
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
Which type of policy BEST helps to ensure that all employees, contractors, and third-party users receive formal communication regarding an organization’s security program?
Which of the following is MOST appropriate to communicate to senior management regarding information risk?
An organization has decided to implement an Internet of Things (IoT) solution to remain competitive in the market. Which of the following should information security do FIRST?
To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?
Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:
Which of the following elements of a service contract would BEST enable an organization to monitor the information security risk associated with a cloud service provider?
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?
A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?
Which of the following provides the BEST evidence that a newly implemented security awareness program has been effective?
An organization's research department plans to apply machine learning algorithms on a large data set containing customer names and purchase history. The risk of personal data leakage is considered high impact. Which of the following is the BEST risk treatment option in this situation?
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
Which of the following is the MOST effective way to ensure information security policies are understood?
What should an information security manager verify FIRST when reviewing an information asset management program?
When assigning a risk owner, the MOST important consideration is to ensure the owner has:
Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?
What should an information security manager do FIRST when an organization is planning to use a third-party cloud computing service for a critical business process?
An information security program is BEST positioned for success when it is closely aligned with:
Which of the following is the PRIMARY reason for granting a security exception?
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
Which of the following should be the KEY consideration when creating an information security communication plan with industry peers?
Which of the following will BEST facilitate integrating the information security program into corporate governance?
Which of the following is the MOST appropriate metric to demonstrate the effectiveness of information security controls to senior management?
Which of the following should an information security manager do FIRST when there is a conflict between the organization's information security policy and a local regulation?
Which of the following is MOST important for an information security manager to consider when developing a business continuity plan (BCP) for ransomware attacks?
A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:
A software vendor has announced a zero-day vulnerability that exposes an organization's critical business systems. The vendor has released an emergency patch. Which of the following should be the information security managers PRIMARY concern?
To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?
In which cloud model does the cloud service buyer assume the MOST security responsibility?
The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:
Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?
Which of the following is MOST effective in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application?
Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?
A security incident has been reported within an organization. When should an information security manager contact the information owner?
Which of the following BEST enables an organization to maintain an appropriate security control environment?
A security incident has been reported within an organization When should an information security manager contact the information owner?
Which of the following should be the FIRST step in developing an information security strategy?
Which of the following is MOST important to consider when aligning a security awareness program with the organization's business strategy?
Which of the following should be the PRIMARY consideration when developing an incident response plan?
The PRIMARY objective of a post-incident review of an information security incident is to:
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
Which of the following presents the GREATEST risk associated with the use of an automated security information and event management (SIEM) system?
In addition to executive sponsorship and business alignment, which of the following is MOST critical for information security governance?
Which of the following BEST enables an organization to determine what activities and changes have occurred on a system during a cybersecurity incident?
ACISO learns that a third-party service provider did not notify the organization of a data breach that affected the service provider's data center. Which of the following should the CISO do FIRST?
Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?
Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?
Which of the following is established during the preparation phase of an incident response plan?
Which of the following components of an information security risk assessment is MOST valuable to senior management?
Which of the following is MOST important to include in an incident response plan to ensure incidents are responded to by the appropriate individuals?
Senior management is concerned about data exposure through the use of public Al services. Which of the following is the information security manager's BEST course of action?
For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?
Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?
Which of the following should be an information security manager s MOST important consideration when determining the priority for implementing security controls?
An organization needs to comply with new security incident response requirements. Which of the following should the information security manager do FIRST?
Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?
An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?
Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?
Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?
Which of the following is the BEST approach for governing noncompliance with security requirements?
Which of the following is an information security manager's MOST important course of action after receiving information about a new cybersecurity threat?
Which of the following should an information security manager do FIRST when a mandatory security standard hinders the achievement of an identified business objective?
Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?
In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:
A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?
Which of the following is the PRIMARY reason to regularly update business continuity and disaster recovery documents?
Which of the following is the BEST way to compete for funding for an information security program in an organization with limited resources?
Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?
Which of the following BEST enables an organization to operate smoothly with reduced capacities when service has been disrupted?
IT projects have gone over budget with too many security controls being added post-production. Which of the following would MOST help to ensure that relevant controls are applied to a project?
An organization plans to offer clients a new service that is subject to regulations. What should the organization do FIRST when developing a security strategy in support of this new service?
Which of the following is the MOST effective way to detect security incidents?
To support effective risk decision making, which of the following is MOST important to have in place?
Which of the following is MOST appropriate for an organization to consider when defining incident classification and categorization levels?
Which of the following is the MOST important reason for logging firewall activity?
After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:
Which of the following should be triggered FIRST when unknown malware has infected an organization's critical system?
After logging in to a web application, additional authentication is checked at various application points. Which of the following is the PRIMARY reason for such an approach?
Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?
What should be the GREATEST concern for an information security manager of a large multinational organization when outsourcing data processing to a cloud service provider?
Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?
Which of the following should be the FIRST consideration when developing a strategy for protecting an organization's data?
During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?
Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?
Which of the following is the GREATEST benefit of using AI tools in security operations?
Which of the following is the BEST strategy when determining an organization's approach to risk treatment?
Which of the following is MOST important to ensuring that incident management plans are executed effectively?
Which of the following provides the BEST indication of the return on information security investment?
Of the following, who would provide the MOST relevant input when aligning the information security strategy with organizational goals?
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?
Which or the following is MOST important to consider when determining backup frequency?
An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?
Which of the following is MOST important to include in monthly information security reports to the board?
Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
Which of the following is the GREATEST inherent risk when performing a disaster recovery plan (DRP) test?
Security administration efforts will be greatly reduced following the deployment of which of the following techniques?
Which of the following is the BEST way to ensure data is not co-mingled or exposed when using a cloud service provider?
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
An information security manager determines there are a significant number of exceptions to a newly released industry-required security standard. Which of the following should be done NEXT?
An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?
Which of the following is the BEST justification for making a revision to a password policy?
The PRIMARY benefit of introducing a single point of administration in network monitoring is that it:
Which of the following is the MOST important factor in an organization's selection of a key risk indicator (KRI)?
Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?
The categorization of incidents is MOST important for evaluating which of the following?
Which of the following should be the GREATEST concern for an information security manager when an annual audit reveals the organization's business continuity plan (BCP) has not been reviewed or updated in more than a year?
Which of the following will ensure confidentiality of content when accessing an email system over the Internet?
Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?
An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?
An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
Which of the following is the PRIMARY objective of testing security controls within a critical infrastructure?
For the information security manager, integrating the various assurance functions of an organization is important PRIMARILY to enable:
Which of the following is the BEST way to determine the effectiveness of an incident response plan?
Which of the following BEST enables the integration of information security governance into corporate governance?
Which of the following processes is MOST important for the success of a business continuity plan (BCP)?
Which of the following is MOST important in increasing the effectiveness of incident responders?
When choosing the best controls to mitigate risk to acceptable levels, the information security manager's decision should be MAINLY driven by:
Application data integrity risk is MOST directly addressed by a design that includes:
An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?
An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
Which of the following events would MOST likely require a revision to the information security program?
Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?
To effectively manage an organization's information security risk, it is MOST important to:
Which of the following is the BEST option to lower the cost to implement application security controls?
Which of the following is MOST important to include in an information security strategy?
The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:
Which of the following would be MOST helpful when creating information security policies?
The MOST effective tools for responding to new and advanced attacks are those that detect attacks based on:
An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?
After a server has been attacked, which of the following is the BEST course of action?
Which of the following metrics would BEST demonstrate the success of a newly implemented information security framework?
Which of the following provides the BEST evidence that a recently established infofmation security program is effective?
Which of the following is the BEST way to address data availability concerns when outsourcing information security administration?
Which of the following should be given the HIGHEST priority during an information security post-incident review?
Which is MOST important to identify when developing an effective information security strategy?
Which of the following is the BEST indicator of an organization's information security status?
What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
Which of the following BEST indicates that information security governance and corporate governance are integrated?
An organization is experiencing a sharp increase in incidents related to phishing messages. The root cause is an outdated email filtering system that is no longer supported by the vendor. Which of the following should be the information security manager's FIRST course of action?
Which of the following should be done FIRST when establishing an information security governance framework?
What should be the FIRST step when an Internet of Things (loT) device in an organization's network is confirmed to have been hacked?
When establishing metrics for an information security program, the BEST approach is to identify indicators that:
Which of the following documents should contain the INITIAL prioritization of recovery of services?
Which of the following is the MOST critical consideration when shifting IT operations to an Infrastructure as a Service (laaS) model hosted in a foreign country?
Which of the following is MOST important for guiding the development and management of a comprehensive information security program?
When properly implemented, secure transmission protocols protect transactions:
Which of the following should be updated FIRST to account for new regulatory requirements that impact current information security controls?
Which of the following presents the GREATEST challenge to the recovery of critical systems and data following a ransomware incident?
Which of the following is MOST helpful for protecting an enterprise from advanced persistent threats (APTs)?