Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?
Which of the following is the BEST indication of an effective disaster recovery planning process?
While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?
What should a global information security manager do FIRST when informed that a new regulation with significant impact will go into effect soon?
Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?
Which of the following is the BEST tool to monitor the effectiveness of information security governance?
Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?
Which of the following should be implemented to BEST reduce the likelihood of a security breach?
An organization recently updated and published its information security policy and standards. What should the information security manager do NEXT?
An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?
Which of the following is the BEST indication of information security strategy alignment with the “&
Which of the following is the BEST way to obtain support for a new organization-wide information security program?
Which of the following BEST supports the incident management process for attacks on an organization's supply chain?
Which of the following is MOST important to include in an incident response plan to ensure incidents are responded to by the appropriate individuals?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?
Which of the following should be established FIRST when implementing an information security governance framework?
Which of the following would provide the MOST value to senior management when presenting the results of a risk assessment?
An organization permits the storage and use of its critical and sensitive information on employee-owned smartphones. Which of the following is the BEST security control?