Recommendations for enterprise investment in security technology should be PRIMARILY based on:
Which of the following is MOST appropriate to communicate to senior management regarding information risk?
An organization faces severe fines and penalties if not in compliance with local regulatory requirements by an established deadline. Senior management has asked the information security manager to prepare an action plan to achieve compliance.
Which of the following would provide the MOST useful information for planning purposes? »
Which of the following BEST facilitates effective strategic alignment of security initiatives?
An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:
The PRIMARY advantage of single sign-on (SSO) is that it will:
An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?
Which of the following should an information security manager do FIRST when developing an organization's disaster recovery plan (DRP)?
Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?
Which of the following is the BEST technical defense against unauthorized access to a corporate network through social engineering?
Which of the following is MOST effective in gaining support for the information security strategy from senior management?
What is the role of the information security manager in finalizing contract negotiations with service providers?
Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?
Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?
When establishing metrics for an information security program, the BEST approach is to identify indicators that:
Which of the following would provide the MOST value to senior management when presenting the results of a risk assessment?
Which of the following BEST indicates that an information security governance framework has been successfully implemented?
Reevaluation of risk is MOST critical when there is:
When developing a categorization method for security incidents, the categories MUST:
Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?