A data loss prevention (DLP) tool has flagged personally identifiable information (Pll) during transmission. Which of the following should the information security manager do FIRST?
Which of the following should be the KEY consideration when creating an information security communication plan with industry peers?
Which of the following is MOST important for the successful implementation of an incident response plan?
Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?
The MOST effective tools for responding to new and advanced attacks are those that detect attacks based on:
An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:
An organization's quality process can BEST support security management by providing:
An organization has been penalized by regulatory authorities for failing to notify them of a major security breach that may have compromised customer data. Which of the following is MOST likely in need of review and updating to prevent similar penalties in the future?
An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?
An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?
Which of the following is the BEST method for determining whether new risks exist in legacy systems?
A software vendor has announced a zero-day vulnerability that exposes an organization's critical business systems. The vendor has released an emergency patch. Which of the following should be the information security managers PRIMARY concern?
The executive management of a domestic organization has announced plans to expand operations to multiple international locations. Which of the following should be the information security manager's FIRST step upon learning of these plans?
What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?
Which of the following is the BEST evidence of alignment between corporate and information security governance?
Which of the following BEST enables staff acceptance of information security policies?
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?