Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?
When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?
Prior to implementing a bring your own device (BYOD) program, it is MOST important to:
Which of the following BEST enables an information security manager to demonstrate the effectiveness of the information security and risk program to senior management?
An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?
Which of the following BEST supports effective communication during information security incidents7
An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?
Which of the following is MOST important to have in place as a basis for developing an effective information security program that supports the organization's business goals?
Which of the following BEST indicates that information security governance and corporate governance are integrated?
Which of the following tasks would provide a newly appointed information security manager with the BEST view of the organization's existing security posture?
Of the following, who is accountable for data loss in the event of an information security incident at a third-party provider?
Which of the following is the BEST way to determine the gap between the present and desired state of an information security program?
A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:
Which of the following should have the MOST influence on an organization's response to a new industry regulation?
Which of the following would be of GREATEST assistance in determining whether to accept residual risk of a critical security system?
Which of the following is MOST appropriate for an organization to consider when defining incident classification and categorization levels?
The department head of application development has decided to accept the risks identified in a recent assessment. No recommendations will be implemented, even though the recommendations are required by regulatory oversight. What should the information security manager do NEXT?
Which of the following BEST enables an organization to maintain legally admissible evidence7