An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
Which of the following BEST supports information security management in the event of organizational changes in security personnel?
Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?
Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?
Which of the following BEST helps to ensure risk appetite is considered during the risk treatment process?
Which of the following provides an information security manager with the MOST accurate indication of the organization's ability to respond to a cyber attack?
Senior management wants to thoroughly test a disaster recovery plan (DRP) for a mission-critical system. Which of the following would provide the MOST reliable results?
A data loss prevention (DLP) tool has flagged personally identifiable information (Pll) during transmission. Which of the following should the information security manager do FIRST?
Which of the following should be the PRIMARY focus of an organization with immature incident detection capabilities?
Which of the following is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?
Which of the following provides the MOST useful information for identifying security control gaps on an application server?
Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?
When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?
Which of the following MUST happen immediately following the identification of a malware incident?
Which of the following is MOST important for guiding the development and management of a comprehensive information security program?
Which of the following is MOST important when responding to a major security incident?
Which of the following is the PRIMARY objective of testing security controls within a critical infrastructure?
Which of the following will have the GREATEST influence on the successful adoption of an information security governance program?
A global organization is developing an incident response team. The organization wants to keep headquarters informed of all incidents and wants to be able to present a unified response to widely dispersed events. Which of the following BEST supports these objectives?
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?