An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?
Which of the following is the PRIMARY role of the information security manager in application development?
Which of the following metrics is MOST appropriate for evaluating the incident notification process?
Which of the following BEST facilitates an information security manager's efforts to obtain senior management commitment for an information security program?
An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:
Which is the BEST method to evaluate the effectiveness of an alternate processing site when continuous uptime is required?
Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
Which of the following processes is MOST important for the success of a business continuity plan (BCP)?
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
Which of the following BEST enables staff acceptance of information security policies?
An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?
Senior management has just accepted the risk of noncompliance with a new regulation What should the information security manager do NEX*P
To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?
Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?
Which of the following is MOST important for an information security manager to consider when developing a business continuity plan (BCP) for ransomware attacks?
An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?
The PRIMARY purpose for continuous monitoring of security controls is to ensure:
The department head of application development has decided to accept the risks identified in a recent assessment. No recommendations will be implemented, even though the recommendations are required by regulatory oversight. What should the information security manager do NEXT?
When updating the information security policy to accommodate a new regulation, the information security manager should FIRST:
Which of the following is the PRIMARY objective of a business impact analysis (BIA)?
Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?
Which of the following is MOST useful to an information security manager when determining the need to escalate an incident to senior?
Which of the following will BEST facilitate timely and effective incident response?
Which of the following BEST minimizes information security risk in deploying applications to the production environment?
During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
An information security manager has been tasked with developing materials to update the board, regulatory agencies, and the media about a security incident. Which of the following should the information security manager do FIRST?
Which of the following would be MOST useful to help senior management understand the status of information security compliance?
Which of the following is the BEST indication of an effective information security awareness training program?
How does an organization PRIMARILY benefit from the creation of an information security steering committee?
Which of the following parties should be responsible for determining access levels to an application that processes client information?
An information security manager is alerted to multiple security incidents across different business units, with unauthorized access to sensitive data and potential data exfiltration from critical systems. Which of the following is the BEST course of action to appropriately classify and prioritize these incidents?
Which of the following is MOST important to convey to employees in building a security risk-aware culture?
Which of the following BEST enables an organization to maintain legally admissible evidence7
A common drawback of email software packages that provide native encryption of messages is that the encryption:
Which of the following metrics would BEST demonstrate the success of a newly implemented information security framework?
Which of the following is the BEST justification for making a revision to a password policy?
Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?
The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
An information security team has confirmed that threat actors are taking advantage of a newly announced critical vulnerability within an application. Which of the following should be done
FIRST?
A financial company executive is concerned about recently increasing cyberattacks and needs to take action to reduce risk. The organization would BEST respond by:
Which of the following BEST enables an organization to transform its culture to support information security?
An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?
Which of the following BEST enables an organization to maintain an appropriate security control environment?
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
When creating an incident response plan, the PRIMARY benefit of establishing a clear definition of a security incident is that it helps to:
When building support for an information security program, which of the following elements is MOST important?
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:
Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?
The information security manager of a multinational organization has been asked to consolidate the information security policies of its regional locations. Which of the following would be of
GREATEST concern?
What should an information security manager verify FIRST when reviewing an information asset management program?
Which of the following provides the BEST input to determine the level of protection needed for an IT system?
Which of the following should be an information security manager's FIRST course of action when a potential business breach is discovered in a critical business system?
Which type of plan is PRIMARILY intended to reduce the potential impact of security events that may occur?
Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?
Meeting which of the following security objectives BEST ensures that information is protected against unauthorized disclosure?
Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?
Which of the following elements of a service contract would BEST enable an organization to monitor the information security risk associated with a cloud service provider?
Which of the following is the BEST control to protect customer personal information that is stored in the cloud?
Which of the following is the BEST technical defense against unauthorized access to a corporate network through social engineering?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?
A security incident has been reported within an organization. When should an information security manager contact the information owner?
Which of the following is the MOST important consideration when determining which type of failover site to employ?
Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?
An information security manager determines there are a significant number of exceptions to a newly released industry-required security standard. Which of the following should be done NEXT?
Which of the following is the BEST indication that an organization has integrated information security governance with corporate governance?
Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
Which of the following is the BEST way to address data availability concerns when outsourcing information security administration?
Which of the following should be the PRIMARY objective when establishing a new information security program?
To ensure that a new application complies with information security policy, the BEST approach is to:
When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?
Once a suite of security controls has been successfully implemented for an organization's business units, it is MOST important for the information security manager to:
Capacity planning would prevent:
A PRIMARY purpose of creating security policies is to:
Which of the following BEST enables an information security manager to obtain organizational support for the implementation of security controls?
Which of the following should be implemented to BEST reduce the likelihood of a security breach?
Which of the following is the MOST effective defense against malicious insiders compromising confidential information?
Communicating which of the following would be MOST helpful to gain senior management support for risk treatment options?
Which of the following is MOST important for an information security manager to verify when selecting a third-party forensics provider?
When developing an incident escalation process, the BEST approach is to classify incidents based on:
An information security manager has been asked to provide both one-year and five-year plans for the information security program. What is the PRIMARY purpose for the long-term plan?
An information security manager has identified that security risks are not being treated in a timely manner. Which of the following
The use of a business case to obtain funding for an information security investment is MOST effective when the business case:
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
Which of the following is MOST helpful for aligning security operations with the IT governance framework?
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?
A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?
An organization is planning to outsource network management to a service provider. Including which of the following in the contract would be the MOST effective way to mitigate information security risk?
The BEST way to integrate information security governance with corporate governance is to ensure:
Which of the following is the MOST important outcome of a post-incident review?
Which of the following should be the PRIMARY basis for an information security strategy?
Which of the following has the GREATEST influence on the successful integration of information security within the business?
A business continuity plan (BCP) should contain:
Which of the following is the BEST indicator of an organization's information security status?
Which of the following is the FIRST step to establishing an effective information security program?
To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?
Which of the following BEST enables an organization to continuously assess the information security risk posture?
Which of the following should an information security manager do FIRST when noncompliance with security standards is identified?
Which of the following is the MOST effective way to detect information security incidents?
Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?
An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?
Which of the following is the MOST important reason to involve external forensics experts in evidence collection when responding to a major security breach?
The categorization of incidents is MOST important for evaluating which of the following?
Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?
Which of the following is the BEST approach for governing noncompliance with security requirements?
What should be the GREATEST concern for an information security manager of a large multinational organization when outsourcing data processing to a cloud service provider?
Which of the following BEST enables the assignment of risk and control ownership?
Which of the following is MOST important for an information security manager to consider when determining whether data should be stored?
Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?
Which of the following is MOST likely to reduce the effectiveness of a SIEM system?
Which of the following events is MOST likely to require an organization to revisit its information security framework?
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
Which risk is introduced when using only sanitized data for the testing of applications?
Which of the following will result in the MOST accurate controls assessment?
Which of the following would BEST enable the timely execution of an incident response plan?
Which of the following is MOST important for the improvement of a business continuity plan (BCP)?
A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?
Data classification is PRIMARILY the responsibility of:
Which of the following is the PRIMARY advantage of an organization using Disaster Recovery as a Service (DRaaS) to help manage its disaster recovery program?
Which of the following should an information security manager do FIRST after a new cybersecunty regulation has been introduced?
Which of the following would BEST justify continued investment in an information security program?
An organization is performing due diligence when selecting a third party. Which of the following is MOST helpful to reduce the risk of unauthorized sharing of information during this process?
While responding to a high-profile security incident, an information security manager observed several deficiencies in the current incident response plan. When would be the BEST time to update the plan?
Which of the following events would MOST likely require a revision to the information security program?
When an organization experiences a disruptive event, the business continuity plan (BCP) should be triggered PRIMARILY based on:
Which of the following has the GREATEST influence on an organization's information security strategy?
An incident response team has established that an application has been breached. Which of the following should be done NEXT?
Which of the following is MOST important for guiding the development and management of a comprehensive information security program?
The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?
The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:
Which of the following sources is MOST useful when planning a business-aligned information security program?
What is the PRIMARY benefit to an organization that maintains an information security governance framework?
A recent application security assessment identified a number of low- and medium-level vulnerabilities. Which of the following stakeholders is responsible for deciding the appropriate risk treatment option?
Which of the following is the BEST course of action when using a web application that has known vulnerabilities?
Which of the following is the PRIMARY impact of organizational culture on the effectiveness of an information security program?
As part of incident response activities, the BEST time to begin the recovery process is after:
During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?
Which of the following BEST enables the integration of information security governance into corporate governance?
Which of the following should be the PRIMARY focus of a status report on the information security program to senior management?
What is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?
To support effective risk decision making, which of the following is MOST important to have in place?
Which of the following BEST enables an organization to determine the costs of downtime for a critical application?
Which of the following is the MOST important consideration during the design phase of a business impact analysis (BIA)?
Which of the following would MOST effectively ensure that a new server is appropriately secured?
Which of the following BEST enables an organization to determine what activities and changes have occurred on a system during a cybersecurity incident?
Which of the following is the MOST effective way to demonstrate alignment of information security strategy with business objectives?
An organization provides notebook PCs, cable wire locks, smartphone access, and virtual private network (VPN) access to its remote employees. Which of the following is MOST important for the information security manager to ensure?
Which of the following is the MOST effective way to influence organizational culture to align with security guidelines?
What should be the FIRST step when implementing data loss prevention (DLP) technology?
Which of the following is a PRIMARY benefit of managed security solutions?
An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?
Which of the following BEST enables an organization to operate smoothly with reduced capacities when service has been disrupted?
Which of the following is MOST important for the effective implementation of an information security governance program?
Which of the following would provide the MOST value to senior management when presenting the results of a risk assessment?
A balanced scorecard MOST effectively enables information security:
Which of the following is MOST important in order to obtain senior leadership support when presenting an information security strategy?
Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?
An organization's quality process can BEST support security management by providing:
Which is following should be an information security manager's PRIMARY focus during the development of a critical system storing highly confidential data?
Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?
The GREATEST challenge when attempting data recovery of a specific file during forensic analysis is when:
An organization has updated its business goals in the middle of the fiscal year to respond to changes in market conditions. Which of the following is MOST important for the information security manager to update in support of the new goals?
Which of the following is the BEST reason to implement an information security architecture?
Which of the following is the MOST effective way to protect the authenticity of data in transit?
Which of the following will ensure confidentiality of content when accessing an email system over the Internet?
Which of the following should be done NEXT following senior management's decision to comply with new personal data regulations that are much more stringent than those currently followed to avoid massive fines?
Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?
Which of the following is established during the preparation phase of an incident response plan?
Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
Which of the following is the PRIMARY reason to regularly update business continuity and disaster recovery documents?
An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:
Which of the following is MOST important to include in a post-incident review following a data breach?
Which of the following has the MOST influence on the inherent risk of an information asset?
Which of the following is the MOST important consideration when establishing an organization's information security governance committee?
Which of the following is MOST difficult to measure following an information security breach?
Which of the following should be the FIRST step in developing an information security strategy?
An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?
The business value of an information asset is derived from:
What should a global information security manager do FIRST when informed that a new regulation with significant impact will go into effect soon?
Which type of recovery site is MOST reliable and can support stringent recovery requirements?
Which of the following is MOST important to the successful implementation of an information security program?
An organization is considering the feasibility of implementing a big data solution to analyze customer data. In order to support this initiative, the information security manager should FIRST:
An organization is aligning its incident response capability with a public cloud service provider. What should be the information security manager's FIRST course of action?
Which of the following is the BEST way to help ensure alignment of the information security program with organizational objectives?
Which of the following will BEST enable an organization to meet incident response requirements when outsourcing its incident response function?
Which of the following is the MOST essential element of an information security program?
Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?
A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:
Business objectives and organizational risk appetite are MOST useful inputs to the development of information security:
The PRIMARY purpose for deploying information security metrics is to:
Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?
When developing an asset classification program, which of the following steps should be completed FIRST?
When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?
The PRIMARY advantage of single sign-on (SSO) is that it will:
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:
Which of the following is the BEST way to build a risk-aware culture?
Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?
Which of the following is MOST likely to reduce the effectiveness of a SIEM system?
In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.
Before relying on this certification, it is MOST important that the information security manager confirms that the:
Which of the following is the BEST way to obtain organization-wide support for an information security program?
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
Before approving the implementation of a new security solution, senior management requires a business case. Which of the following would BEST support the justification for investment?
When management changes the enterprise business strategy which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be defined in the business continuity plan (BCP) to manage this requirement?
Which of the following is a desired outcome of information security governance?
An information security manager has been notified that two senior executives have the ability to elevate their own privileges in the corporate accounting system, in violation of policy. What is the FIRST step to address this issue?
Which of the following is the PRIMARY benefit of implementing an information security governance framework?
Which of the following is the MOST important characteristic of an effective information security metric?
An organization has suffered from a large-scale security event impacting a critical system. Following the decision to restore the system at an alternate location, which plan should be invoked?
When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:
An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?
A penetration test against an organization's external web application shows several vulnerabilities. Which of the following presents the GREATEST concern?
Which of the following is PRIMARILY determined by asset classification?
An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
Which of the following has the GREATEST impact on the effectiveness of an organization’s security posture?
Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?
Which of the following is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?
An organization's automated security monitoring tool generates an excessively large amount of falsq positives. Which of the following is the BEST method to optimize the monitoring process?
Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?
Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?
Which of the following BEST indicates that information assets are classified accurately?
A business impact analysis (BIA) BEST enables an organization to establish:
An organization plans to offer clients a new service that is subject to regulations. What should the organization do FIRST when developing a security strategy in support of this new service?
Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?
When drafting the corporate privacy statement for a public website, which of the following MUST be included?
Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?
An organization has an ongoing security awareness training program. Employee participation has been decreasing over the year, while the number of malware and phishing incidents from email has been increasing. What is the information security manager's BEST course of action?
What is the MOST important consideration for an organization operating in a highly regulated market when new regulatory requirements with high impact to the business need to be implemented?
Which of the following is MOST important for the successful implementation of an incident response plan?
An online bank identifies a successful network attack in progress. The bank should FIRST:
Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?
An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:
Which of the following BEST enables the restoration of operations after a limited ransomware incident occurs?
An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?
An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?
Which of the following is the FIRST step when conducting a post-incident review?
Which of the following is the MOST effective way to address an organizations security concerns during contract negotiations with a third party?
Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?
Which of the following is the MOST important detail to capture in an organization's risk register?
Which or the following is MOST important to consider when determining backup frequency?
The MOST useful technique for maintaining management support for the information security program is:
Which of the following BEST helps to ensure the effective execution of an organization's disaster recovery plan (DRP)?
A PRIMARY benefit of adopting an information security framework is that it provides:
An information security manager has become aware that a third-party provider is not in compliance with the statement of work (SOW). Which of the following is the BEST course of action?
Threat and vulnerability assessments are important PRIMARILY because they are:
Which of the following BEST determines the allocation of resources during a security incident response?
Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?
Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?
Which of the following is the PRIMARY objective of information asset classification?
Which of the following is a PRIMARY responsibility of the information security goxernance function?
Which of the following would provide the BEST evidence to senior management that security control performance has improved?
A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
Which of the following BEST prepares a computer incident response team for a variety of information security scenarios?
Which is MOST important to identify when developing an effective information security strategy?
Which type of system is MOST effective for monitoring cyber incidents based on impact and tracking them until they are closed?
An information security policy was amended recently to support an organization's new information security strategy. Which of the following should be the information security manager's NEXT step?
Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?
Which of the following will BEST facilitate the integration of information security governance into enterprise governance?
Which of the following is necessary to ensure consistent protection for an organization's information assets?
Which of the following roles is BEST able to influence the security culture within an organization?
Which of the following is the responsibility of a risk owner?
Which of the following is the MOST important consideration when defining control objectives?
The PRIMARY goal when conducting post-incident reviews is to identify:
The executive management of a domestic organization has announced plans to expand operations to multiple international locations. Which of the following should be the information security manager's FIRST step upon learning of these plans?
Which of the following should be the PRIMARY goal of information security?
An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?
What type of control is being implemented when a security information and event management (SIEM) system is installed?
An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
Which of the following risks is an example of risk transfer?
An organization recently outsourced the development of a mission-critical business application. Which of the following would be the BEST way to test for the existence of backdoors?
When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?
Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?
Which of the following is MOST important to include in an information security status report to senior management?
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
In a call center, the BEST reason to conduct a social engineering is to:
Which of the following is the MOST important role of the information security manager when the organization is in the process of adopting emerging technologies?
When taking a risk-based approach to vulnerability management, which of the following is MOST important to consider when prioritizing a vulnerability?
Which of the following should be of GREATEST concern regarding an organization's security controls?
Which of the following BEST helps to enable the desired information security culture within an organization?
Which of the following is the BEST source of information to support an organization's information security vision and strategy?
Which of the following is MOST effective for communicating forward-looking trends within security reporting?
Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?