Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?
An information security manager has been notified that two senior executives have the ability to elevate their own privileges in the corporate accounting system, in violation of policy. What is the FIRST step to address this issue?
What should be an information security manager's MOST important consideration when developing a multi-year plan?
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
A global organization has outsourced security processes to a service provider by means of a global agreement. What is the MOST efficient approach to meet country-specific regulatory requirements?
The PRIMARY consideration when responding to a ransomware attack should be to ensure:
An organization has determined that fixing a security vulnerability in a critical application is too costly to be feasible, but the impact is material to the business. Which of the following is the MOST appropriate risk treatment?
When collecting admissible evidence, which of the following is the MOST important requirement?
Which of the following is MOST relevant for an information security manager to communicate to the board of directors?
A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?
Which of the following BEST facilitates effective strategic alignment of security initiatives?
Which of the following would BEST guide the development and maintenance of an information security program?
Which of the following is the BEST way to help ensure alignment of the information security program with organizational objectives?
Which of the following is the PRIMARY impact of organizational culture on the effectiveness of an information security program?
Identifying which of the following BEST enables a cyberattack to be contained?
Which of the following analyses will BEST identify the external influences to an organization's information security?
An information security manager has been tasked with developing materials to update the board, regulatory agencies, and the media about a security incident. Which of the following should the information security manager do FIRST?