In which of the following examples would an organization be more willing to accept a risk instead of mitigating it?
Devising controls for information security is a balance between?
Which of the following is a critical operational component of an Incident Response Program (IRP)?
File Integrity Monitoring (FIM) is considered a
Which of the following conditions would be the MOST probable reason for a security project to be rejected by the executive board of an organization?
In accordance with best practices and international standards, how often is security awareness training provided to employees of an organization?
What should an auditor do after discovering that a security analyst is working a late-night shift every week as the senior server administrator?
The primary purpose of a risk register is to:
Providing oversight of an information security program for the organization is the primary responsibility of which group?
Which of the following is of MOST importance when security leaders of an organization are required to align security to influence the culture of an organization?
One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?
During a cyber incident, which non-security personnel might be needed to assist the security team?
Which of the following are primary concerns for management with regard to assessing internal control objectives?
As the CISO, you are the project sponsor for a highly visible log management project. The objective of the project is to centralize all the enterprise logs into a security information and event management (SIEM) system. You requested the results of the performance quality audits activity.
The performance quality audit activity is done in what project management process group?
ABC Limited has recently suffered a security breach with customers’ social security number available on the dark web for sale. The CISO, during the time of the incident, has been fired, and you have been hired as the replacement. The analysis of the breach found that the absence of an insider threat program, lack of least privilege policy, and weak access control was to blame. You would like to implement key performance indicators to mitigate the risk.
Which metric would meet the requirement?