Which of the following would provide the MOST value to senior management when presenting the results of a risk assessment?
Which of the following is the GREATEST benefit of using AI tools in security operations?
Which of the following should be done FIRST when implementing a security program?
Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its cloud services.
Which of the following should be the PRIMARY focus of Company A's information security manager?
An internal audit has revealed that a number of information assets have been inappropriately classified. To correct the classifications, the remediation accountability should be assigned to:
Which of the following is MOST important for the improvement of a business continuity plan (BCP)?
Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?
An organization provides notebook PCs, cable wire locks, smartphone access, and virtual private network (VPN) access to its remote employees. Which of the following is MOST important for the information security manager to ensure?
An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
Which of the following is MOST appropriate for an organization to consider when defining incident classification and categorization levels?
When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:
Which of the following is MOST helpful for protecting an enterprise from advanced persistent threats (APTs)?
If the investigation of an incident is not completed within the time allocated in the incident response plan, which of the following actions should be taken by the incident response team?
Which of the following is the BEST justification for making a revision to a password policy?
A software vendor has announced a zero-day vulnerability that exposes an organization's critical business systems. The vendor has released an emergency patch. Which of the following should be the information security managers PRIMARY concern?
In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
Which of the following should an information security manager do FIRST when noncompliance with security standards is identified?
Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
Meeting which of the following security objectives BEST ensures that information is protected against unauthorized disclosure?