Which of the following is the BEST control to protect customer personal information that is stored in the cloud?
An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?
Which of the following change management procedures is MOST likely to cause concern to the information security manager?
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
When is the BEST time to verify that a production system's security mechanisms meet control objectives?
During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?
An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?
Which of the following should an information security manager do FIRST when a mandatory security standard hinders the achievement of an identified business objective?
Of the following, who would provide the MOST relevant input when aligning the information security strategy with organizational goals?
Which of the following BEST indicates that information security governance and corporate governance are integrated?
Which of the following is the BEST method to ensure compliance with password standards?
Which of the following would BEST enable the timely execution of an incident response plan?
Which of the following is the GREATEST benefit of classifying information security incidents?
The PRIMARY consideration when responding to a ransomware attack should be to ensure:
When creating an incident response plan, the PRIMARY benefit of establishing a clear definition of a security incident is that it helps to:
Which of the following is the BEST indication of an effective disaster recovery planning process?
Which of the following should be the FIRST step when performing triage of a malware incident?
Which is MOST important to identify when developing an effective information security strategy?
When deciding to move to a cloud-based model, the FIRST consideration should be:
Which of the following is the MOST important reason to consider organizational culture when developing an information security program?