Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?
Implementing the principle of least privilege PRIMARILY requires the identification of:
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
Which of the following BEST enables an organization to continuously assess the information security risk posture?
In which cloud model does the cloud service buyer assume the MOST security responsibility?
Which of the following BEST facilitates the development of a comprehensive information security policy?
Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?
Which of the following elements of a service contract would BEST enable an organization to monitor the information security risk associated with a cloud service provider?
A PRIMARY purpose of creating security policies is to:
Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?
Which of the following would be MOST helpful when creating information security policies?
A finance department director has decided to outsource the organization's budget application and has identified potential providers. Which of the following actions should be initiated FIRST by IN information security manager?
An information security manager is alerted to multiple security incidents across different business units, with unauthorized access to sensitive data and potential data exfiltration from critical systems. Which of the following is the BEST course of action to appropriately classify and prioritize these incidents?
When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?
Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?
Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?
An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?
Which of the following provides the BEST indication of the return on information security investment?
When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:
Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?