Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?
Which of the following should be given the HIGHEST priority during an information security post-incident review?
Which of the following would be of GREATEST assistance in determining whether to accept residual risk of a critical security system?
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
To inform a risk treatment decision, which of the following should the information security manager compare with the organization's risk appetite?
Which of the following is the PRIMARY reason to review the firewall logs when an external network-based attack is reported by the intrusion detection system (IDS)?
An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization's critical systems?
An organization is leveraging tablets to replace desktop computers shared by shift-based staff These tablets contain critical business data and are inherently at increased risk of theft Which of the following will BEST help to mitigate this risk''
Which of the following is the MOST important objective of post-incident review activities?
Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?
Which of the following is the MOST effective way to identify changes in an information security environment?
Which of the following presents the GREATEST challenge to a large multinational organization using an automated identity and access management (1AM) system?
Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?
An organization experienced a loss of revenue during a recent disaster. Which of the following would BEST prepare the organization to recover?
When properly implemented, secure transmission protocols protect transactions:
Which of the following is MOST important when responding to a major security incident?
What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?
Prior to conducting a forensic examination, an information security manager should:
The PRIMARY objective of a post-incident review of an information security incident is to:
Which of the following will BEST enable an effective information asset classification process?