Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?
Which of the following BEST enables an organization to effectively manage emerging cyber risk?
Which of the following is MOST relevant for an information security manager to communicate to the board of directors?
An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?
In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:
Information security policies should PRIMARILY reflect alignment with:
Which of the following would BEST help to ensure appropriate security controls are built into software?
Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?
An information security policy was amended recently to support an organization's new information security strategy. Which of the following should be the information security manager's NEXT step?
Which of the following is the PRIMARY advantage of an organization using Disaster Recovery as a Service (DRaaS) to help manage its disaster recovery program?
Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?
Which of the following processes is MOST important for the success of a business continuity plan (BCP)?
Which of the following incident response phases involves actions to help safeguard critical systems while maintaining business operations?
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
Which of the following is the PRIMARY objective of information asset classification?
Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?
Which of the following provides the BEST input to determine the level of protection needed for an IT system?
When determining an acceptable risk level which of the following is the MOST important consideration?
When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?
After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?