IT projects have gone over budget with too many security controls being added post-production. Which of the following would MOST help to ensure that relevant controls are applied to a project?
A penetration test against an organization's external web application shows several vulnerabilities. Which of the following presents the GREATEST concern?
Which of the following is the MOST effective way to help assure the integrity of an organization’s accounting system?
Which of the following BEST indicates the effectiveness of the vendor risk management process?
Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?
An information security manager has learned of an increasing trend in attacks that use phishing emails impersonating an organization's CEO in an attempt to commit wire transfer fraud. Which of the following is the BEST way to reduce the risk associated with this type of attack?
Which of the following is the BEST indication that an organization has integrated information security governance with corporate governance?
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
What should be the FIRST step when an Internet of Things (loT) device in an organization's network is confirmed to have been hacked?
Which of the following is the BEST indication that an organization has a mature information security culture?
An organization's disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?
Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?
Which of the following should be considered FIRST when recovering a compromised system that needs a complete rebuild?
Which of the following is the MOST important consideration when defining control objectives?
An incident response plan is being developed for servers hosting sensitive information. In the event of a breach, who should make the decision to shut down the system?
What should an information security manager do FIRST when an organization is planning to use a third-party cloud computing service for a critical business process?
An organization that conducts business globally is planning to utilize a third-party service provider to process payroll information. Which of the following issues poses the GREATEST risk to the organization?
Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?