An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?
What is the MOST important consideration for an organization operating in a highly regulated market when new regulatory requirements with high impact to the business need to be implemented?
Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?
After a server has been attacked, which of the following is the BEST course of action?
Which of the following is MOST important when responding to a major security incident?
Which of the following should an information security manager do FIRST upon learning that a competitor has experienced a ransomware attack?
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
Which of the following is ESSENTIAL to ensuring effective incident response?
An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
Which of the following is established during the preparation phase of an incident response plan?
What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?
The PRIMARY consideration when responding to a ransomware attack should be to ensure:
An incident response plan is being developed for servers hosting sensitive information. In the event of a breach, who should make the decision to shut down the system?
The PRIMARY goal to a post-incident review should be to:
The PRIMARY purpose of implementing information security governance metrics is to:
Which of the following BEST indicates the effectiveness of the vendor risk management process?
An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?
The MAIN benefit of implementing a data loss prevention (DLP) solution is to:
An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?