Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?
In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?
The PRIMARY purpose for continuous monitoring of security controls is to ensure:
An organization has remediated a security flaw in a system. Which of the following should be done NEXT?
An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?
An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?
An organization is experiencing a sharp increase in incidents related to phishing messages. The root cause is an outdated email filtering system that is no longer supported by the vendor. Which of the following should be the information security manager's FIRST course of action?
An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?
A business impact analysis (BIA) BEST enables an organization to establish:
An organization is aligning its incident response capability with a public cloud service provider. What should be the information security manager's FIRST course of action?
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
When deciding to move to a cloud-based model, the FIRST consideration should be:
Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?
Of the following, who should be assigned as the owner of a newly identified risk related to an organization's new payroll system?
Which of the following is the BEST course of action when using a web application that has known vulnerabilities?
Which of the following BEST enables the assignment of risk and control ownership?
Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?
Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?
Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of
confidentiality?
Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?