Which of the following would BEST ensure that security is integrated during application development?
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
Which of the following should be done FIRST when a SIEM flags a potential event?
An organization needs to comply with new security incident response requirements. Which of the following should the information security manager do FIRST?
Which of the following analyses will BEST identify the external influences to an organization's information security?
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
Which of the following should be done NEXT following senior management's decision to comply with new personal data regulations that are much more stringent than those currently followed to avoid massive fines?
Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?
An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?
Which of the following is the PRIMARY benefit of an information security awareness training program?
A new risk has been identified in a high availability system. The BEST course of action is to:
The MOST useful technique for maintaining management support for the information security program is:
The MOST appropriate time to conduct a disaster recovery test would be after:
Which of the following is MOST important to maintain integration among the incident response plan, business continuity plan (BCP). and disaster recovery plan (DRP)?
Which of the following tasks should be performed once a disaster recovery plan (DRP) has been developed?
For an e-business that requires high availability, which of the following design principles is BEST?
A financial company executive is concerned about recently increasing cyberattacks and needs to take action to reduce risk. The organization would BEST respond by:
Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?
Which of the following should an information security manager do FIRST when there is a conflict between the organization's information security policy and a local regulation?