For an e-business that requires high availability, which of the following design principles is BEST?
Which of the following has the GREATEST impact on the effectiveness of an organization’s security posture?
Which of the following is MOST important to include in security incident escalation procedures?
Which of the following will ensure confidentiality of content when accessing an email system over the Internet?
An organization is implementing an information security governance framework. To communicate the program's effectiveness to stakeholders, it is MOST important to establish:
Which of the following is MOST important for an information security manager to consider when reviewing a security investment plan?
Which of the following is MOST important for an information security manager to consider when determining whether data should be stored?
Which of the following should be of GREATEST concern to an information security manager when evaluating a cloud service provider?
Which of the following is the MOST effective way to detect information security incidents?
Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?
Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?
Which of the following is the BEST approach for managing user access permissions to ensure alignment with data classification?
From an information security perspective, legal issues associated with a transborder flow of technology-related items are MOST often
Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be defined in the business continuity plan (BCP) to manage this requirement?
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
Which of the following is the BEST indication of effective information security governance?
A security incident has been reported within an organization When should an information security manager contact the information owner?
An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?
What is the MOST important consideration when establishing metrics for reporting to the information security strategy committee?