Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
Which of the following is the PRIMARY responsibility of an information security governance committee?
Which of the following is the BEST approach for managing user access permissions to ensure alignment with data classification?
Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?
An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?
Which of the following is MOST appropriate to communicate to senior management regarding information risk?
Which of the following events would MOST likely require a revision to the information security program?
An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?
Which of the following is the BEST way to determine if an information security profile is aligned with business requirements?
An information security manager developing an incident response plan MUST ensure it includes:
Which of the following is MOST important when designing security controls for new cloud-based services?
A recent audit found that an organization's new user accounts are not set up uniformly. Which of the following is MOST important for the information security manager to review?
An information security program is BEST positioned for success when it is closely aligned with:
Which of the following should be the PRIMARY area of focus when mitigating security risks associated with emerging technologies?
An information security manager has confirmed the organization's cloud provider has unintentionally published some of the organization's business data. Which of the following should be done NEXT?
Which of the following is MOST important for an information security manager to consider when developing a business continuity plan (BCP) for ransomware attacks?
Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?
In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?