An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?
Which of the following should be the PRIMARY consideration when developing an incident response plan?
Which of the following is the MOST effective way to identify changes in an information security environment?
Detailed business continuity plans (BCPs) should be PRIMARILY based on:
Which of the following is the MOST important input to the development of an effective information security strategy?
Which of the following desired outcomes BEST supports a decision to invest in a new security initiative?
In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?
An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?
Which of the following will BEST facilitate timely and effective incident response?
Which of the following BEST supports information security management in the event of organizational changes in security personnel?
Which of the following is the MOST critical input to developing policies, standards, and procedures to secure information assets?
When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?
Which of the following should be the FIRST consideration when developing a strategy for protecting an organization's data?
A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:
Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?
An information security manager finds that a soon-to-be deployed online application will increase risk beyond acceptable levels, and necessary controls have not been included. Which of the following is the BEST course of action for the information security manager?
An information security team is investigating an alleged breach of an organization's network. Which of the following would be the BEST single source of evidence to review?
Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?
Which of the following is the BEST course of action when an online company discovers a network attack in progress?
Which of the following is the MOST important factor of a successful information security program?