After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:
An information security manager has become aware that a third-party provider is not in compliance with the statement of work (SOW). Which of the following is the BEST course of action?
Which of the following is the MOST effective defense against malicious insiders compromising confidential information?
Which of the following is the MOST essential element of an information security program?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
In which cloud model does the cloud service buyer assume the MOST security responsibility?
Which of the following is MOST important to include in an incident response plan to ensure incidents are responded to by the appropriate individuals?
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
Implementing the principle of least privilege PRIMARILY requires the identification of:
While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?
Which of the following is the GREATEST benefit of classifying information security incidents?
Which of the following is MOST important when responding to a major security incident?
Which of the following is the BEST approach for data owners to use when defining access privileges for users?
Define access privileges based on user roles.
Adopt user account settings recommended by the vendor.
Perform a risk assessment of the users' access privileges.
Which of the following is MOST important for the effective implementation of an information security governance program?
When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?
When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?
Which of the following is MOST likely to reduce the effectiveness of a SIEM system?
The PRIMARY benefit of integrating information security activities into change management processes is to:
An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?
An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?