Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?
Which of the following metrics is MOST appropriate for evaluating the incident notification process?
Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?
The PRIMARY objective of a post-incident review of an information security incident is to:
An online bank identifies a successful network attack in progress. The bank should FIRST:
What should be the FIRST step when implementing data loss prevention (DLP) technology?
Which risk is introduced when using only sanitized data for the testing of applications?
What should be an information security manager's FIRST step when developing a business case for a new intrusion detection system (IDS) solution?
An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?
Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?
After the occurrence of a major information security incident, which of the following will BEST help an information security manager determine corrective actions?
Which of the following BEST helps to ensure a third-party backup site continues to meet the organization’s information security standards?
An information security manager has been tasked with developing materials to update the board, regulatory agencies, and the media about a security incident. Which of the following should the information security manager do FIRST?
Which of the following is the BEST technical defense against unauthorized access to a corporate network through social engineering?
An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
Which of the following is the MOST effective way to address an organizations security concerns during contract negotiations with a third party?