An information security manager is MOST likely to obtain approval for a new security project when the business case provides evidence of:
Which of the following BEST enables users to recover from ransomware or malware attacks?
When drafting the corporate privacy statement for a public website, which of the following MUST be included?
An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?
An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:
Which of the following BEST facilitates the development of a comprehensive information security policy?
A new risk has been identified in a high availability system. The BEST course of action is to:
Which of the following is the GREATEST benefit of performing a tabletop exercise of the business continuity plan (BCP)?
When building support for an information security program, which of the following elements is MOST important?
Which of the following is MOST important in order to obtain senior leadership support when presenting an information security strategy?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.
Which of the following should be given immediate focus?
An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?
An organization plans to leverage popular social network platforms to promote its products and services. Which of the following is the BEST course of action for the information security manager to support this initiative?
When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:
Which of the following is the BEST approach for data owners to use when defining access privileges for users?
Define access privileges based on user roles.
Adopt user account settings recommended by the vendor.
Perform a risk assessment of the users' access privileges.
Which of the following should be the PRIMARY basis for a severity hierarchy for information security incident classification?
Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?
Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?
Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?