Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?
Detailed business continuity plans (BCPs) should be PRIMARILY based on:
Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?
Which type of backup BEST enables an organization to recover data after a ransomware attack?
The MAIN benefit of implementing a data loss prevention (DLP) solution is to:
Which of the following provides an information security manager with the MOST useful information on new threats and emerging risks that could impact business objectives?
Which of the following provides the BEST indication of the return on information security investment?
The PRIMARY reason to properly classify information assets is to determine:
Recovery time objectives (RTOs) are an output of which of the following?
A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager's FIRST step in addressing the issue should be to:
Which of the following should be done FIRST to prioritize response to incidents?
Which of the following provides the MOST comprehensive understanding of an organization's information security posture?
An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?
Which of the following should be the PRIMARY basis for an information security strategy?
An information security team is investigating an alleged breach of an organization's network. Which of the following would be the BEST single source of evidence to review?
To help ensure that an information security training program is MOST effective, its contents should be:
Which of the following is the BEST indicator of a successful intrusion into an organization's systems?
Which of the following is the PRIMARY reason to assign a risk owner in an organization?
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
Which of the following is the MOST critical input to developing policies, standards, and procedures to secure information assets?