Which of the following BEST illustrates residual risk within an organization?
The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?
Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?
An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?
How does an organization PRIMARILY benefit from the creation of an information security steering committee?
An experienced information security manager joins a new organization and begins by conducting an audit of all key IT processes. Which of the following findings about the vulnerability management program should be of GREATEST concern?
When developing an information security strategy for an organization, which of the following is MOST helpful for understanding where to focus efforts?
Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?
Which of the following BEST indicates that an information security governance framework has been successfully implemented?
Of the following, who is MOST appropriate to own the risk associated with the failure of a privileged access control?
Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?
Which of the following is the MOST important reason to consider organizational culture when developing an information security program?
Which of the following is the BEST indicator of an organization's information security status?
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
Which of the following is a desired outcome of information security governance?
Which of the following is the MOST effective way to convey information security responsibilities across an organization?
Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?