When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?
Conducting log analysis falls into which phase of the incident management life cycle?
Which type of policy BEST helps to ensure that all employees, contractors, and third-party users receive formal communication regarding an organization’s security program?
A recent application security assessment identified a number of low- and medium-level vulnerabilities. Which of the following stakeholders is responsible for deciding the appropriate risk treatment option?
An organization is implementing an information security governance framework. To communicate the program's effectiveness to stakeholders, it is MOST important to establish:
Which of the following is the PRIMARY reason for an information security manager to periodically review existing controls?
Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?
An organization that conducts business globally is planning to utilize a third-party service provider to process payroll information. Which of the following issues poses the GREATEST risk to the organization?
Which of the following is the BEST way to build a risk-aware culture?
The MOST important element in achieving executive commitment to an information security governance program is:
Which of the following is the MOST effective way to determine the alignment of an information security program with the business strategy?
An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?
An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?
An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:
• A bad actor broke into a business-critical FTP server by brute forcing an administrative password
• The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
• The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
• After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail
Which of the following could have been prevented by conducting regular incident response testing?
Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
Which of the following is MOST important to ensure the alignment of an information security program with the organizational strategy?
Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?