The MOST important element in achieving executive commitment to an information security governance program is:
Which of the following should be the PRIMARY area of focus when mitigating security risks associated with emerging technologies?
Which of the following is the MOST important constraint to be considered when developing an information security strategy?
Which of the following should be the PRIMARY outcome of an information security program?
Which of the following BEST supports investments in an information security program?
Which of the following is the PRIMARY reason for an information security manager to periodically review existing controls?
Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?
When deciding to move to a cloud-based model, the FIRST consideration should be:
Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?
What is the PRIMARY objective of implementing standard security configurations?
An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?
An organization would like to invest in a new emerging technology. Which of the following is MOST important for the information security manager to consider when evaluating its impact?
Which of the following is MOST important for an information security manager to verify when selecting a third-party forensics provider?
When an organization experiences a disruptive event, the business continuity plan (BCP) should be triggered PRIMARILY based on:
An information security manager learns of a new standard related to an emerging technology the organization wants to implement. Which of the following should the information security manager recommend be done FIRST?
Of the following, who is MOST appropriate to own the risk associated with the failure of a privileged access control?
An organization is implementing an information security governance framework. To communicate the program's effectiveness to stakeholders, it is MOST important to establish:
Which of the following is the BEST course of action when using a web application that has known vulnerabilities?