Which of the following is MOST important when developing an information security strategy?
Which of the following would MOST effectively ensure that a new server is appropriately secured?
An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
Which of the following BEST enables an organization to identify and contain security incidents?
Which of the following is the PRIMARY objective of a cyber resilience strategy?
Which of the following risk responses is an example of risk transfer?
Which of the following is MOST important to include in an information security policy?
An information security program is BEST positioned for success when it is closely aligned with:
Senior management has expressed concern that the organization's intrusion prevention system (IPS) may repeatedly disrupt business operations Which of the following BEST indicates that the information security manager has tuned the system to address this concern?
Which of the following should be done FIRST when developing a business continuity plan (BCP)?
An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?
Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?
The MOST effective tools for responding to new and advanced attacks are those that detect attacks based on:
During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:
Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?
An organization uses a security standard that has undergone a major revision by the certifying authority. The old version of the standard will no longer be used for organizations wishing to maintain their certifications. Which of the following should be the FIRST
course of action?
After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:
An information security manager is assessing security risk associated with a cloud service provider. Which of the following is the MOST appropriate reference to consult when performing this assessment?
Which of the following is the BEST approach for governing noncompliance with security requirements?