The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
Which type of backup BEST enables an organization to recover data after a ransomware attack?
Which of the following is the BEST way to ensure data is not co-mingled or exposed when using a cloud service provider?
Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?
Which of the following events is MOST likely to require an organization to revisit its information security framework?
Which of the following is MOST helpful for determining which information security policies should be implemented by an organization?
Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?
When establishing classifications of security incidents for the development of an incident response plan, which of the following provides the MOST valuable input?
The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?
During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?
In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
An organization's information security manager reads on social media that a recently purchased vendor product has been compromised and customer data has been posted online. What should the information security manager do FIRST?
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
Which of the following metrics BEST demonstrates the effectiveness of an organization's security awareness program?
A new type of ransomware has infected an organization's network. Which of the following would have BEST enabled the organization to detect this situation?
A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?
Senior management has just accepted the risk of noncompliance with a new regulation What should the information security manager do NEX*P
Which of the following factors would have the MOST significant impact on an organization's information security governance mode?
Which of the following should an information security manager do FIRST after identifying suspicious activity on a PC that is not in the organization's IT asset inventory?