Which of the following should include contact information for representatives of equipment and software vendors?
Which of the following is the MOST important reason for logging firewall activity?
Which of the following is MOST helpful in the development of a cost-effective information security strategy that is aligned with business requirements?
Which of the following is MOST critical when creating an incident response plan?
A newly appointed information security manager of a retailer with multiple stores discovers an HVAC (heating, ventilation, and air conditioning) vendor has remote access to the stores to enable real-time monitoring and equipment diagnostics. Which of the following should be the information security manager's FIRST course of action?
A recent application security assessment identified a number of low- and medium-level vulnerabilities. Which of the following stakeholders is responsible for deciding the appropriate risk treatment option?
Which of the following is MOST effective in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application?
When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:
Which of the following is the MOST important factor in an organization's selection of a key risk indicator (KRI)?
An organization's HR department requires that employee account privileges be removed from all corporate IT systems within three days of termination to comply with a government regulation However, the systems all have different user directories, and it currently takes up to four weeks to remove the privileges Which of the following would BEST enable regulatory compliance?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?
Which of the following is the MOST important input to the development of an effective information security strategy?
The use of a business case to obtain funding for an information security investment is MOST effective when the business case:
An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?
Business objectives and organizational risk appetite are MOST useful inputs to the development of information security:
Which of the following is the BEST indication of an effective information security program?
Which of the following BEST indicates the effectiveness of the vendor risk management process?
Which of the following is the BEST indication that an organization has integrated information security governance with corporate governance?
The PRIMARY goal of the eradication phase in an incident response process is to: