Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?
During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?
Which of the following would BEST justify continued investment in an information security program?
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
An organization is leveraging tablets to replace desktop computers shared by shift-based staff These tablets contain critical business data and are inherently at increased risk of theft Which of the following will BEST help to mitigate this risk''
During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?
The PRIMARY reason for creating a business case when proposing an information security project is to:
Which of the following will BEST enable an effective information asset classification process?
The GREATEST challenge when attempting data recovery of a specific file during forensic analysis is when:
In which cloud model does the cloud service buyer assume the MOST security responsibility?
What should an information security manager verify FIRST when reviewing an information asset management program?
The MOST useful technique for maintaining management support for the information security program is:
What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?
An incident response plan is being developed for servers hosting sensitive information. In the event of a breach, who should make the decision to shut down the system?
Which of the following should be done FIRST when developing a business continuity plan (BCP)?
Which of the following is the BEST control to protect customer personal information that is stored in the cloud?
The PRIMARY purpose for continuous monitoring of security controls is to ensure: