Which of the following should be done FIRST when implementing a security program?
What is the PRIMARY benefit to an organization that maintains an information security governance framework?
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
Which of the following is the MOST effective way to prevent information security incidents?
Which of the following provides the BEST evidence that a recently established infofmation security program is effective?
When updating the information security policy to accommodate a new regulation, the information security manager should FIRST:
The PRIMARY benefit of integrating information security activities into change management processes is to:
To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
The PRIMARY purpose for continuous monitoring of security controls is to ensure:
When taking a risk-based approach to vulnerability management, which of the following is MOST important to consider when prioritizing a vulnerability?
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
Which of the following is MOST important to have in place for an organization's information security program to be effective?
An information security manager finds that a soon-to-be deployed online application will increase risk beyond acceptable levels, and necessary controls have not been included. Which of the following is the BEST course of action for the information security manager?
Which of the following is the GREATEST benefit resulting from the introduction of data security standards for payment cards?
An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?
A global organization has outsourced security processes to a service provider by means of a global agreement. What is the MOST efficient approach to meet country-specific regulatory requirements?
While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?