Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager's FIRST step?
When determining an acceptable risk level which of the following is the MOST important consideration?
Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?
What should be the GREATEST concern for an information security manager of a large multinational organization when outsourcing data processing to a cloud service provider?
An organization has just updated its backup capability to a new cloud-based solution. Which of the following tests will MOST effectively verify this change is working as intended?
Which of the following should an information security manager do FIRST after a new cybersecunty regulation has been introduced?
An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?
An information security manager has learned of an increasing trend in attacks that use phishing emails impersonating an organization's CEO in an attempt to commit wire transfer fraud. Which of the following is the BEST way to reduce the risk associated with this type of attack?
Which of the following would BEST support the business case for an increase in the information security budget?
Which of the following is MOST important to consider when determining asset valuation?
Which of the following should be done FIRST when implementing a security program?
An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?
For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?
The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
Which of the following BEST helps to enable the desired information security culture within an organization?
Senior management is concerned about data exposure through the use of public Al services. Which of the following is the information security manager's BEST course of action?
Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?
A new information security reporting requirement will soon become effective. Which of the following should be the information security manager's FIRST action?