Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?
Which of the following is necessary to ensure consistent protection for an organization's information assets?
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
Which of the following is MOST important to include in an incident response plan to ensure incidents are responded to by the appropriate individuals?
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
Of the following, who is MOST appropriate to own the risk associated with the failure of a privileged access control?
Which of the following is the MOST critical factor for information security program success?
Which of the following is the BEST method to ensure compliance with password standards?
Which of the following is an information security manager's BEST course of action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?
Which of the following documents should contain the INITIAL prioritization of recovery of services?
Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
Which of the following is the BEST way to enhance training for incident response teams?
A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?
Recovery time objectives (RTOs) are BEST determined by:
Prior to conducting a forensic examination, an information security manager should:
Which of the following is the MOST important objective of post-incident review activities?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?
Which of the following would BEST justify continued investment in an information security program?