Which of the following is the BEST course of action for an information security manager to align security and business goals?
An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:
Which of the following would BEST guide the development and maintenance of an information security program?
The PRIMARY advantage of single sign-on (SSO) is that it will:
Which of the following is the PRIMARY preventive method to mitigate risks associated with privileged accounts?
Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?
The effectiveness of an incident response team will be GREATEST when:
Which of the following is the PRIMARY reason to assign a risk owner in an organization?
Which of the following is the PRIMARY reason to conduct a post-incident review?
An online bank identifies a successful network attack in progress. The bank should FIRST:
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
Which of the following should be done FIRST to prioritize response to incidents?
Which of the following will BEST enable an organization to meet incident response requirements when outsourcing its incident response function?
When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?
What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?
Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?
Which of the following BEST enables an organization to provide ongoing assurance that legal and regulatory compliance requirements can be met?
Which of the following BEST helps to ensure the effective execution of an organization's disaster recovery plan (DRP)?
In which cloud model does the cloud service buyer assume the MOST security responsibility?
Which of the following is the BEST indication ofa successful information security culture?
An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?
Which of the following has the GREATEST impact on efforts to improve an organization's security posture?
An employee who is a remote user has copied financial data from the corporate server to a laptop using virtual private network (VPN) connectivity. Which of the following is the MOST important factor to determine if it should be classified as a data leakage incident?
An email digital signature will:
Which of the following is MOST important to include in an incident response plan to ensure incidents are responded to by the appropriate individuals?
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?
Which of the following BEST determines the data retention strategy and subsequent policy for an organization?
Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?
Which of the following is the MOST effective way to prevent information security incidents?
Identifying which of the following BEST enables a cyberattack to be contained?
After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?
When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?
An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?
Which of the following will BEST facilitate integrating the information security program into corporate governance?
Which of the following is MOST important for the information security manager to include when presenting changes in the security risk profile to senior management?
Which of the following is the BEST approach for governing noncompliance with security requirements?
To help ensure that an information security training program is MOST effective, its contents should be:
Which of the following is MOST helpful in determining the criticality of an organization's business functions?
An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?
Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?
Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?
Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?
In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
Which of the following should an information security manager do FIRST to address the risk associated with a new third-party cloud application that will not meet organizational security requirements?
Who is BEST suited to determine how the information in a database should be classified?
To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:
An organization has been penalized by regulatory authorities for failing to notify them of a major security breach that may have compromised customer data. Which of the following is MOST likely in need of review and updating to prevent similar penalties in the future?
Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?
Which of the following is the PRIMARY reason for an information security manager to periodically review existing controls?
In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:
Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?
To improve the efficiency of the development of a new software application, security requirements should be defined:
Which of the following activities MUST be performed by an information security manager for change requests?
Which of the following has the GREATEST influence on the successful integration of information security within the business?
A business continuity plan (BCP) should contain:
Which of the following is MOST important to ensure incident management readiness?
Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?
An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?
Which of the following BEST enables an organization to determine the costs of downtime for a critical application?
Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?
An information security manager has become aware that a third-party provider is not in compliance with the statement of work (SOW). Which of the following is the BEST course of action?
A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?
Which of the following should an information security manager do FIRST when noncompliance with security standards is identified?
Which of the following should be the PRIMARY outcome of an information security program?
A recent audit found that an organization's new user accounts are not set up uniformly. Which of the following is MOST important for the information security manager to review?
Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?
A risk owner has accepted a large amount of risk due to the high cost of controls. Which of the following should be the information security manager's PRIMARY focus in this situation?
Which of the following is MOST important to include in security incident escalation procedures?
Which of the following is the BEST indication that an organization has a mature information security culture?
Which of the following is MOST relevant for an information security manager to communicate to the board of directors?
Which of the following is MOST important to consider when aligning a security awareness program with the organization's business strategy?
A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?
Which of the following is the BEST reason for senior management to support a business case for developing a monitoring system for a critical application?
Which of the following should be the KEY consideration when creating an information security communication plan with industry peers?
An organization is implementing an information security governance framework. To communicate the program's effectiveness to stakeholders, it is MOST important to establish:
Which of the following BEST enables staff acceptance of information security policies?
Which of the following should be done FIRST after a ransomware incident has been successfully contained?
Which of the following is MOST helpful for aligning security operations with the IT governance framework?
Following a risk assessment, an organization has made the decision to adopt a bring your own device (BYOD) strategy. What should the information security manager do NEXT?
Which of the following elements of a service contract would BEST enable an organization to monitor the information security risk associated with a cloud service provider?
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
The PRIMARY purpose of vulnerability identification is to:
Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?
Which of the following is the MOST important objective when planning an incident response program?
Which of the following tasks should be performed once a disaster recovery plan (DRP) has been developed?
Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?
When analyzing the emerging risk and threat landscape, an information security manager should FIRST:
Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?
Which of the following is the BEST source of information to support an organization's information security vision and strategy?
Which of the following is the MOST effective way to convey information security responsibilities across an organization?
When establishing classifications of security incidents for the development of an incident response plan, which of the following provides the MOST valuable input?
Which of the following is MOST important to consider when defining control objectives?
Management has announced the acquisition of a new company. The information security manager of the parent company is concerned that conflicting access rights may cause critical information to be exposed during the integration of the two companies. To BEST address this concern, the information security manager should:
A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager's FIRST step in addressing the issue should be to:
Which of the following BEST enables an organization to operate smoothly with reduced capacities when service has been disrupted?
An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?
Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?
Senior management is concerned about data exposure through the use of public Al services. Which of the following is the information security manager's BEST course of action?
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
Which of the following roles has the PRIMARY responsibility to ensure the operating effectiveness of IT controls?
Which type of backup BEST enables an organization to recover data after a ransomware attack?
Which of the following is an information security manager's BEST course of action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?
Which of the following is the GREATEST challenge when developing key risk indicators (KRIs)?
Which of the following is MOST important in increasing the effectiveness of incident responders?
An organization has decided to implement an Internet of Things (IoT) solution to remain competitive in the market. Which of the following should information security do FIRST?
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
Which of the following is the BEST indication of an effective disaster recovery planning process?
Which of the following is the PRIMARY objective of testing security controls within a critical infrastructure?
To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?
The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
Which of the following is the MOST effective way to increase security awareness in an organization?
Which of the following is the MOST important consideration during the design phase of a business impact analysis (BIA)?
Which of the following messages would be MOST effective in obtaining senior management's commitment to information security management?
Which of the following should be updated FIRST when aligning the incident response plan with the corporate strategy?
A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?
When developing an incident escalation process, the BEST approach is to classify incidents based on:
To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?
Which of the following would be MOST useful to help senior management understand the status of information security compliance?
Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?
An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?
When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?
Which of the following is CRITICAL to ensure the appropriate stakeholder makes decisions during a cybersecurity incident?
Which of the following is the MOST essential element of an information security program?
Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?
Which of the following provides an information security manager with the MOST accurate indication of the organization's ability to respond to a cyber attack?
Which of the following is the FIRST step in developing a business continuity plan (BCP)?
An organization has remediated a security flaw in a system. Which of the following should be done NEXT?
Which of the following should be done FIRST when establishing an information security governance framework?
Which of the following is MOST important to have in place when conducting a security control assessment of a system?
Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?
Which type of plan is PRIMARILY intended to reduce the potential impact of security events that may occur?
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?
Which of the following is the MOST important function of an information security steering committee?
Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?
Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?
Which of the following should have the MOST influence on the development of information security policies?
An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?
Which of the following BEST facilitates the development of a comprehensive information security policy?
Which of the following is MOST important for the successful implementation of an incident response plan?
Meeting which of the following security objectives BEST ensures that information is protected against unauthorized disclosure?
Which of the following is the BEST course of action when using a web application that has known vulnerabilities?
A technical vulnerability assessment on a personnel information management server should be performed when:
In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
Which of the following is the MOST appropriate risk response when the risk impact has been determined to be immaterial and the likelihood is very low?
The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:
Which of the following is the MOST important characteristic of an effective information security metric?
Which of the following is an information security manager's MOST important course of action when responding to a major security incident that could disrupt the business?
Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?
The contribution of recovery point objective (RPO) to disaster recovery is to:
Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?
A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:
What should be the FIRST step when implementing data loss prevention (DLP) technology?
Which of the following is the PRIMARY advantage of an organization using Disaster Recovery as a Service (DRaaS) to help manage its disaster recovery program?
An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:
• A bad actor broke into a business-critical FTP server by brute forcing an administrative password
• The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
• The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
• After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail
Which of the following could have been prevented by conducting regular incident response testing?
An organization has updated its business goals in the middle of the fiscal year to respond to changes in market conditions. Which of the following is MOST important for the information security manager to update in support of the new goals?
Which of the following is a function of the information security steering committee?
An experienced information security manager joins a new organization and begins by conducting an audit of all key IT processes. Which of the following findings about the vulnerability management program should be of GREATEST concern?
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
Which of the following should be updated FIRST to account for new regulatory requirements that impact current information security controls?
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
Which of the following is the BEST way to obtain support for a new organization-wide information security program?
Which of the following is MOST important to the effectiveness of an information security program?
The BEST way to report to the board on the effectiveness of the information security program is to present:
Which of the following should be done FIRST when implementing a security program?
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
Which of the following BEST enables an organization to transform its culture to support information security?
Which of the following roles is BEST able to influence the security culture within an organization?
During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?
An information security manager has been notified that two senior executives have the ability to elevate their own privileges in the corporate accounting system, in violation of policy. What is the FIRST step to address this issue?
Which of the following is the BEST indication of an effective information security program?
Which of the following is the MOST important role of the information security manager when the organization is in the process of adopting emerging technologies?
Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?
Which of the following is the MOST important consideration when determining which type of failover site to employ?
Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?
An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?
Which of the following is ESSENTIAL to ensuring effective incident response?
How would the information security program BEST support the adoption of emerging technologies?
Which of the following is MOST important to have in place for an organization's information security program to be effective?
A PRIMARY benefit of adopting an information security framework is that it provides:
Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?
Which of the following BEST helps to enable the desired information security culture within an organization?
An organization faces severe fines and penalties if not in compliance with local regulatory requirements by an established deadline. Senior management has asked the information security manager to prepare an action plan to achieve compliance.
Which of the following would provide the MOST useful information for planning purposes? »
Which of the following BEST indicates the organizational benefit of an information security solution?
When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?
An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?
When building support for an information security program, which of the following elements is MOST important?
An information security manager is MOST likely to obtain approval for a new security project when the business case provides evidence of:
Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?
Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?
Reevaluation of risk is MOST critical when there is:
A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?
Which of the following BEST determines the allocation of resources during a security incident response?
A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?
Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?
A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?
Which of the following is the MOST appropriate metric to demonstrate the effectiveness of information security controls to senior management?
To ensure that a new application complies with information security policy, the BEST approach is to:
An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?
Which of the following is a PRIMARY benefit of managed security solutions?
Which of the following is a PRIMARY responsibility of the information security goxernance function?
Which of the following desired outcomes BEST supports a decision to invest in a new security initiative?
The PRIMARY objective of timely declaration of a disaster is to:
Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?
Which of the following is the BEST method for determining whether a firewall has been configured to provide a comprehensive perimeter defense9
When collecting admissible evidence, which of the following is the MOST important requirement?
Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
Which of the following has the MOST influence on the information security investment process?
Which of the following is MOST important for an information security manager to consider when determining whether data should be stored?
Which of the following is the BEST indication of an effective information security awareness training program?
Which of the following is MOST important when conducting a forensic investigation?
Of the following, who should be assigned as the owner of a newly identified risk related to an organization's new payroll system?
After the occurrence of a major information security incident, which of the following will BEST help an information security manager determine corrective actions?
Information security controls should be designed PRIMARILY based on:
Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?
An incident response plan is being developed for servers hosting sensitive information. In the event of a breach, who should make the decision to shut down the system?
Which of the following is PRIMARILY determined by asset classification?
A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?
An organization has identified IT failures in a call center application. Of the following, who should own this risk?
What should an information security manager do FIRST when an organization is planning to use a third-party cloud computing service for a critical business process?
An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:
Which of the following is the FIRST step to establishing an effective information security program?
An incident response team has established that an application has been breached. Which of the following should be done NEXT?
Which of the following events is MOST likely to require an organization to revisit its information security framework?
Implementing the principle of least privilege PRIMARILY requires the identification of:
To effectively manage an organization's information security risk, it is MOST important to:
Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:
An organization is considering the feasibility of implementing a big data solution to analyze customer data. In order to support this initiative, the information security manager should FIRST:
Which of the following is MOST important to the effectiveness of an information security steering committee?
Who has the PRIMARY authority to decide if additional risk treatments are required to mitigate an identified risk?
Which of the following is the BEST way to enhance training for incident response teams?
Which of the following is the BEST way to determine the gap between the present and desired state of an information security program?
Which of the following would provide the MOST value to senior management when presenting the results of a risk assessment?
Which of the following would BEST ensure that security is integrated during application development?
After a server has been attacked, which of the following is the BEST course of action?
Which of the following is the MOST effective defense against malicious insiders compromising confidential information?
Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?
An information security program is BEST positioned for success when it is closely aligned with:
From a business perspective, the GREATEST benefit of an incident response plan is that it:
A business impact analysis (BIA) should be periodically executed PRIMARILY to:
An organization is considering using a third party to host sensitive archived data. Which of the following is MOST important to verify before entering into the relationship?
A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?
An incident response policy should include:
A KEY consideration in the use of quantitative risk analysis is that it:
An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?
Which of the following is the BEST approach for data owners to use when defining access privileges for users?
Define access privileges based on user roles.
Adopt user account settings recommended by the vendor.
Perform a risk assessment of the users' access privileges.
An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?
Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?
Which of the following is the MOST important criterion when deciding whether to accept residual risk?
A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?
Which of the following presents the GREATEST challenge to a security operations center's wna GY of potential security breaches?
A common drawback of email software packages that provide native encryption of messages is that the encryption:
Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
A recovery point objective (RPO) is required in which of the following?
Which of the following would be of GREATEST assistance in determining whether to accept residual risk of a critical security system?
The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:
Which of the following BEST facilitates effective incident response testing?
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
Of the following, who is BEST suited to own the risk discovered in an application?
When developing an asset classification program, which of the following steps should be completed FIRST?
Which of the following is necessary to ensure consistent protection for an organization's information assets?
Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?
An information security policy was amended recently to support an organization's new information security strategy. Which of the following should be the information security manager's NEXT step?
Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?
When creating an incident response plan, the PRIMARY benefit of establishing a clear definition of a security incident is that it helps to:
A PRIMARY purpose of creating security policies is to:
Of the following, who would provide the MOST relevant input when aligning the information security strategy with organizational goals?