An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?
Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?
The PRIMARY purpose of vulnerability identification is to:
An organization is aligning its incident response capability with a public cloud service provider. What should be the information security manager's FIRST course of action?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
How does an organization PRIMARILY benefit from the creation of an information security steering committee?
Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?
A new application has entered the production environment with deficient technical security controls. Which of the following is MOST Likely the root cause?
Which of the following BEST enables an organization to transform its culture to support information security?
Which of the following tasks should be performed once a disaster recovery plan (DRP) has been developed?
An organization is increasingly using Software as a Service (SaaS) to replace in-house hosting and support of IT applications. Which of the following would be the MOST effective way to help ensure procurement decisions consider information security concerns?
Which of the following is the responsibility of a risk owner?
Which of the following is MOST important to include in security incident escalation procedures?
Which of the following has the MOST influence on the inherent risk of an information asset?
An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?
Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?
A department has reported that a security control is no longer effective. Which of the following is the information security manager's BEST course of action?
Which type of recovery site is MOST reliable and can support stringent recovery requirements?
Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?
Which of the following is the PRIMARY benefit of implementing an information security governance framework?
An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?
An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?
An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?
Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?
Which of the following would be MOST helpful when creating information security policies?
Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?
An organization has decided to implement an Internet of Things (IoT) solution to remain competitive in the market. Which of the following should information security do FIRST?
Which of the following is the BEST way to obtain organization-wide support for an information security program?
When remote access is granted to a company's internal network, the MOST important consideration should be that access is provided:
The use of a business case to obtain funding for an information security investment is MOST effective when the business case:
An organization recently outsourced the development of a mission-critical business application. Which of the following would be the BEST way to test for the existence of backdoors?
Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
Which type of policy BEST helps to ensure that all employees, contractors, and third-party users receive formal communication regarding an organization’s security program?
Which of the following provides the MOST effective response against ransomware attacks?
After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:
Which of the following is CRITICAL to ensure the appropriate stakeholder makes decisions during a cybersecurity incident?
Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?
Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?
Which of the following is the BEST approach for governing noncompliance with security requirements?
When establishing metrics for an information security program, the BEST approach is to identify indicators that:
Which of the following is MOST important to consider when defining control objectives?
Which of the following is the FIRST step to establishing an effective information security program?
An information security policy was amended recently to support an organization's new information security strategy. Which of the following should be the information security manager's NEXT step?
An information security manager developing an incident response plan MUST ensure it includes:
Which of the following is the PRIMARY purpose of an acceptable use policy?
Which of the following would be MOST helpful to identify worst-case disruption scenarios?
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?
Which of the following BEST supports information security management in the event of organizational changes in security personnel?
An information security manager determines there are a significant number of exceptions to a newly released industry-required security standard. Which of the following should be done NEXT?
Recovery time objectives (RTOs) are BEST determined by:
Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?
An organization has updated its business goals in the middle of the fiscal year to respond to changes in market conditions. Which of the following is MOST important for the information security manager to update in support of the new goals?
Which of the following should be the PRIMARY goal of information security?
An email digital signature will:
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
Which of the following has the GREATEST impact on the effectiveness of an organization’s security posture?
An organization is performing due diligence when selecting a third party. Which of the following is MOST helpful to reduce the risk of unauthorized sharing of information during this process?
Which of the following is MOST important for the information security manager to include when presenting changes in the security risk profile to senior management?
A recent audit found that an organization's new user accounts are not set up uniformly. Which of the following is MOST important for the information security manager to review?
Which of the following should be updated FIRST when aligning the incident response plan with the corporate strategy?
The results of a risk assessment for a potential network reconfiguration reveal a high likelihood of sensitive data being compromised. What is the information security manager's BEST course of
action?
An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization's critical systems?
Which of the following is MOST important when conducting a forensic investigation?
Which of the following is MOST helpful in the development of a cost-effective information security strategy that is aligned with business requirements?
During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?
Which of the following should be the PRIMARY objective of an information security governance framework?
To ensure that a new application complies with information security policy, the BEST approach is to:
Which of the following is the MOST important outcome of effective risk treatment?
Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?
What should be the GREATEST concern for an information security manager of a large multinational organization when outsourcing data processing to a cloud service provider?
Which of the following is the MOST effective way to address an organizations security concerns during contract negotiations with a third party?
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be in the business continuity plan (BCP) to manage this requirement?
An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?
The PRIMARY reason for creating a business case when proposing an information security project is to:
When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?
The PRIMARY objective of a post-incident review of an information security incident is to:
What will BEST facilitate the success of new security initiatives?
Which of the following would BEST guide the development and maintenance of an information security program?
After a server has been attacked, which of the following is the BEST course of action?
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
An employee who is a remote user has copied financial data from the corporate server to a laptop using virtual private network (VPN) connectivity. Which of the following is the MOST important factor to determine if it should be classified as a data leakage incident?
Which of the following is MOST appropriate to communicate to senior management regarding information risk?
Which of the following should be the PRIMARY basis for a severity hierarchy for information security incident classification?
Which of the following BEST enables an organization to effectively manage emerging cyber risk?
What should an information security manager verify FIRST when reviewing an information asset management program?
Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?
How would the information security program BEST support the adoption of emerging technologies?
Which of the following presents the GREATEST challenge to a large multinational organization using an automated identity and access management (1AM) system?
Which of the following is the MOST important consideration when establishing an organization's information security governance committee?
During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:
Which of the following BEST determines an information asset's classification?
An organization has remediated a security flaw in a system. Which of the following should be done NEXT?
Which of the following has the MOST influence on the information security investment process?
An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?
To inform a risk treatment decision, which of the following should the information security manager compare with the organization's risk appetite?
Which of the following is the MOST effective way to influence organizational culture to align with security guidelines?
Which of the following should be done FIRST when establishing an information security governance framework?
During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
Several months after the installation of a new firewall with intrusion prevention features to block malicious activity, a breach was discovered that came in through the firewall shortly after installation. This breach could have been detected earlier by implementing firewall:
Which of the following is MOST important to ensuring that incident management plans are executed effectively?
To help ensure that an information security training program is MOST effective, its contents should be:
Which of the following should be done FIRST to prioritize response to incidents?
An information security team has confirmed that threat actors are taking advantage of a newly announced critical vulnerability within an application. Which of the following should be done
FIRST?
Following an employee security awareness training program, what should be the expected outcome?
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?
A recovery point objective (RPO) is required in which of the following?
If the investigation of an incident is not completed within the time allocated in the incident response plan, which of the following actions should be taken by the incident response team?
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
Which of the following is the BEST justification for making a revision to a password policy?
A financial institution is planning to develop a new mobile application. Which of the following is the BEST time to begin assessments of the application's security compliance?
Reevaluation of risk is MOST critical when there is:
Which of the following BEST indicates that information assets are classified accurately?
Which of the following should be done NEXT following senior management's decision to comply with new personal data regulations that are much more stringent than those currently followed to avoid massive fines?
An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?
Which of the following should be an information security manager's PRIMARY concern when an organization is expanding business to a new country?
Which of the following is the BEST indication of an effective disaster recovery planning process?
What is the role of the information security manager in finalizing contract negotiations with service providers?
Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?
An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?
Which of the following is the BEST way to determine the effectiveness of an incident response plan?
Which of the following BEST enables an organization to provide ongoing assurance that legal and regulatory compliance requirements can be met?
Identifying which of the following BEST enables a cyberattack to be contained?
An organization has acquired a new system with strict maintenance instructions and schedules. Where should this information be documented?
Which of the following is a function of the information security steering committee?
Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?
Which of the following is the BEST indicator of an emerging incident?
The business value of an information asset is derived from:
A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?
A business continuity plan (BCP) should contain:
Which of the following will BEST enable an effective information asset classification process?
Which of the following BEST supports effective communication during information security incidents7
Which of the following should be the FIRST step in developing an information security strategy?
Threat and vulnerability assessments are important PRIMARILY because they are:
What type of control is being implemented when a security information and event management (SIEM) system is installed?
An information security manager has become aware that a third-party provider is not in compliance with the statement of work (SOW). Which of the following is the BEST course of action?
Which of the following is the PRIMARY reason to perform regular reviews of the cybersecurity threat landscape?
Which of the following is the BEST way to obtain support for a new organization-wide information security program?
Which of the following is the MOST common cause of cybersecurity breaches?
In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.
Before relying on this certification, it is MOST important that the information security manager confirms that the:
Which of the following is MOST important for the improvement of a business continuity plan (BCP)?
Which of the following provides the BEST indication of the return on information security investment?
Which of the following is MOST important for an information security manager to verify when selecting a third-party forensics provider?
A data loss prevention (DLP) tool has flagged personally identifiable information (Pll) during transmission. Which of the following should the information security manager do FIRST?
Senior management has expressed concern that the organization's intrusion prevention system (IPS) may repeatedly disrupt business operations Which of the following BEST indicates that the information security manager has tuned the system to address this concern?
The MAIN benefit of implementing a data loss prevention (DLP) solution is to:
Which of the following is the GREATEST benefit of performing a tabletop exercise of the business continuity plan (BCP)?
Which of the following BEST helps to enable the desired information security culture within an organization?
Which of the following is MOST effective for communicating forward-looking trends within security reporting?
Recommendations for enterprise investment in security technology should be PRIMARILY based on:
An information security manager has been tasked with developing materials to update the board, regulatory agencies, and the media about a security incident. Which of the following should the information security manager do FIRST?
Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?
IT projects have gone over budget with too many security controls being added post-production. Which of the following would MOST help to ensure that relevant controls are applied to a project?
When developing an asset classification program, which of the following steps should be completed FIRST?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?
An organization has identified IT failures in a call center application. Of the following, who should own this risk?
Which of the following should an information security manager do FIRST to address the risk associated with a new third-party cloud application that will not meet organizational security requirements?
Which of the following is MOST important to include in an information security status report management?
A new risk has been identified in a high availability system. The BEST course of action is to:
Information security controls should be designed PRIMARILY based on:
Which of the following is the BEST indication of an effective information security program?
Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?
Which or the following is MOST important to consider when determining backup frequency?
An organization plans to leverage popular social network platforms to promote its products and services. Which of the following is the BEST course of action for the information security manager to support this initiative?
When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:
Which of the following is the MOST important reason to consider organizational culture when developing an information security program?
Which of the following events is MOST likely to require an organization to revisit its information security framework?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?
Which type of control is an incident response team?
The MOST important reason for having an information security manager serve on the change management committee is to:
Which of the following BEST enables an organization to determine the costs of downtime for a critical application?
When building support for an information security program, which of the following elements is MOST important?
An information security manager has confirmed the organization's cloud provider has unintentionally published some of the organization's business data. Which of the following should be done NEXT?
Labeling information according to its security classification:
The BEST way to identify the risk associated with a social engineering attack is to:
Which of the following is the BEST indication of a mature information security program?
When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?
Which of the following is MOST important to have in place when conducting a security control assessment of a system?
Which of the following is the MOST important constraint to be considered when developing an information security strategy?
Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?
Which of the following is MOST important to include in an information security status report to senior management?
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
Which of the following BEST demonstrates the added value of an information security program?
Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
Which of the following is the GREATEST challenge with assessing emerging risk in an organization?
Which of the following BEST enables an organization to identify and contain security incidents?
An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?
An organization has purchased an Internet sales company to extend the sales department. The information security manager's FIRST step to ensure the security policy framework encompasses the new business model is to:
Which of the following is an information security manager's BEST course of action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?
Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?
The PRIMARY goal to a post-incident review should be to:
Capacity planning would prevent:
Which of the following is MOST helpful to identify whether information security policies have been followed?
Which of the following BEST determines the allocation of resources during a security incident response?
Which of the following components of an information security risk assessment is MOST valuable to senior management?
Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?
Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?
When drafting the corporate privacy statement for a public website, which of the following MUST be included?
Which of the following is the BEST way to determine the gap between the present and desired state of an information security program?
Which of the following should be done FIRST when developing a business continuity plan (BCP)?
Which of the following should be done FIRST when establishing a new data protection program that must comply with applicable data privacy regulations?
Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?
Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?
Which of the following should be done FIRST once a cybersecurity attack has been confirmed?
How does an incident response team BEST leverage the results of a business impact analysis (BIA)?
Which of the following BEST ensures information security governance is aligned with corporate governance?
An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?
A PRIMARY benefit of adopting an information security framework is that it provides:
Which of the following is MOST effective in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application?
Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?
Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
What is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?
Which of the following is a PRIMARY benefit of managed security solutions?
Which of the following would BEST ensure that security is integrated during application development?
An information security manager has been notified that two senior executives have the ability to elevate their own privileges in the corporate accounting system, in violation of policy. What is the FIRST step to address this issue?
Which of the following BEST enables the restoration of operations after a limited ransomware incident occurs?
Which of the following should an information security manager do FIRST after a new cybersecunty regulation has been introduced?
Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification for granting an exception to the policy?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
Which of the following is the BEST approach for managing user access permissions to ensure alignment with data classification?
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
Which of the following BEST enables the assignment of risk and control ownership?
Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?
A multinational organization is introducing a security governance framework. The information security manager's concern is that regional security practices differ. Which of the following should be evaluated FIRST?
Which of the following should be the FIRST step in developing an information security strategy?
When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:
Which of the following defines the triggers within a business continuity plan (BCP)? @
A global organization is planning to expand its operations into a new country with stricter data protection regulations than those in the headquarters' home country. Which of the following is the BEST approach for adopting these new requirements?
Which of the following is PRIMARILY determined by asset classification?
Detailed business continuity plans (BCPs) should be PRIMARILY based on:
Which of the following roles has the PRIMARY responsibility to ensure the operating effectiveness of IT controls?
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
What should be the FIRST step when an Internet of Things (loT) device in an organization's network is confirmed to have been hacked?
Which of the following is the BEST starting point for a newly hired information security manager who has been tasked with identifying and addressing network vulnerabilities?
In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:
Who is BEST suited to determine how the information in a database should be classified?
Which of the following should have the MOST influence on an organization's response to a new industry regulation?
Information security policies should PRIMARILY reflect alignment with:
Which of the following is the BEST control to protect customer personal information that is stored in the cloud?
A financial company executive is concerned about recently increasing cyberattacks and needs to take action to reduce risk. The organization would BEST respond by:
An organization is planning to outsource network management to a service provider. Including which of the following in the contract would be the MOST effective way to mitigate information security risk?
An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:
Security administration efforts will be greatly reduced following the deployment of which of the following techniques?
Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?
Which of the following will have the GREATEST influence on the successful adoption of an information security governance program?
Which of the following metrics provides the BEST evidence of alignment of information security governance with corporate governance?
An organization that conducts business globally is planning to utilize a third-party service provider to process payroll information. Which of the following issues poses the GREATEST risk to the organization?
An incident handler is preparing a forensic image of a hard drive. Which of the following MUST be done to provide evidence that the image is an exact copy of the original?
When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?
Which of the following is established during the preparation phase of an incident response plan?
Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?
Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
Which of the following will BEST facilitate integrating the information security program into corporate governance?
Which of the following should be updated FIRST to account for new regulatory requirements that impact current information security controls?
Which of the following is an example of a change to the external threat landscape?
An online trading company discovers that a network attack has penetrated the firewall. What should be the information security manager's FIRST response?
Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?
An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?
Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:
Which of the following documents should contain the INITIAL prioritization of recovery of services?
Which of the following MUST happen immediately following the identification of a malware incident?
When integrating security risk management into an organization it is MOST important to ensure:
Which of the following incident response phases involves actions to help safeguard critical systems while maintaining business operations?
While responding to a high-profile security incident, an information security manager observed several deficiencies in the current incident response plan. When would be the BEST time to update the plan?