Which of the following provides the BEST indication of the return on information security investment?
Which of the following is the PRIMARY reason to perform regular reviews of the cybersecurity threat landscape?
A software vendor has announced a zero-day vulnerability that exposes an organization's critical business systems. The vendor has released an emergency patch. Which of the following should be the information security managers PRIMARY concern?
Which of the following is a function of the information security steering committee?
Which of the following would MOST effectively ensure that a new server is appropriately secured?
Which of the following metrics provides the BEST evidence of alignment of information security governance with corporate governance?
Which of the following should be done FIRST when implementing a security program?
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
Which of the following BEST facilitates effective strategic alignment of security initiatives?
Which of the following metrics would BEST demonstrate the success of a newly implemented information security framework?
The MOST important element in achieving executive commitment to an information security governance program is:
Which of the following is the PRIMARY purpose of a business impact analysis (BIA)?
Which of the following would provide the MOST value to senior management when presenting the results of a risk assessment?
An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?
An information security manager learns that an existing supplier plans to begin using its recently developed generative AI technology for the same scope of service. A risk assessment was performed on the supplier three months ago with no outstanding findings. Which of the following is the BEST course of action to address the associated risk?
Which of the following would BEST justify spending for a compensating control?
Which of the following BEST enables the restoration of operations after a limited ransomware incident occurs?
Which of the following would be MOST helpful when creating information security policies?
Which of the following BEST demonstrates that an anti-phishing campaign is effective?
After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to: