Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?
Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?
Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?
Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?
Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?
Who should be responsible for determining the level of data classification required for an application related to a new line of business?
A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?
During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?
Which of the following should be the PRIMARY objective of an information security governance framework?
Which of the following is the PRIMARY reason to assign a risk owner in an organization?
An information security manager is working to incorporate media communication procedures into the security incident communication plan. It would be MOST important to include:
An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?
Which of the following would be of GREATEST assistance in determining whether to accept residual risk of a critical security system?
An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?
A new risk has been identified in a high availability system. The BEST course of action is to:
Which of the following is MOST difficult to measure following an information security breach?
Which of the following is MOST important to have in place as a basis for developing an effective information security program that supports the organization's business goals?
A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?
Which of the following is a PRIMARY responsibility of the information security goxernance function?
Which of the following is the BEST way to determine the gap between the present and desired state of an information security program?