Which of the following events would MOST likely require a revision to the information security program?
Prior to conducting a forensic examination, an information security manager should:
An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?
Which of the following should be the PRIMARY outcome of an information security program?
Which is the BEST method to evaluate the effectiveness of an alternate processing site when continuous uptime is required?
An incident management team is alerted ta a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
The contribution of recovery point objective (RPO) to disaster recovery is to:
Which of the following should be done FIRST when a SIEM flags a potential event?
Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?
When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?
An organization's research department plans to apply machine learning algorithms on a large data set containing customer names and purchase history. The risk of personal data leakage is considered high impact. Which of the following is the BEST risk treatment option in this situation?
The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:
The MOST important information for influencing management’s support of information security is:
Which of the following processes is MOST important for the success of a business continuity plan (BCP)?
Which of the following is the BEST justification for making a revision to a password policy?
Embedding security responsibilities into job descriptions is important PRIMARILY because it:
Who is accountable for approving an information security governance framework?
When an organization experiences a disruptive event, the business continuity plan (BCP) should be triggered PRIMARILY based on:
An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?