The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:
Which of the following BEST demonstrates the added value of an information security program?
When choosing the best controls to mitigate risk to acceptable levels, the information security manager's decision should be MAINLY driven by:
Embedding security responsibilities into job descriptions is important PRIMARILY because it:
Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?
What should an information security manager do FIRST when an organization is planning to use a third-party cloud computing service for a critical business process?
A recent application security assessment identified a number of low- and medium-level vulnerabilities. Which of the following stakeholders is responsible for deciding the appropriate risk treatment option?
Which of the following should be of GREATEST concern to an information security manager when evaluating a cloud service provider?
Which of the following provides the BEST evidence that a newly implemented security awareness program has been effective?
Which of the following is the MOST important reason to consider organizational culture when developing an information security program?
Which of the following is the PRIMARY reason to regularly update business continuity and disaster recovery documents?
Following an employee security awareness training program, what should be the expected outcome?
Which of the following provides the MOST comprehensive understanding of an organization's information security posture?
An organization has identified a large volume of old data that appears to be unused. Which of the following should the information
security manager do NEXT?
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?
When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?