Which of the following is the BEST way to ensure the capability to restore clean data after a ransomware attack?
Which of the following should be the MOST important consideration when reviewing an information security strategy?
An organization permits the storage and use of its critical and sensitive information on employee-owned smartphones. Which of the following is the BEST security control?
An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager's FIRST step?
An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?
Which of the following should be the PRIMARY objective of the information security incident response process?
When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:
An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?
Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?
Which of the following is the MOST important consideration when developing an approach to effectively contain security incidents?
An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?
When developing an asset classification program, which of the following steps should be completed FIRST?
A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?
Which of the following is the BEST course of action for an information security manager to align security and business goals?
An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?
An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?