A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager's FIRST step in addressing the issue should be to:
Which of the following should an information security manager do FIRST when a mandatory security standard hinders the achievement of an identified business objective?
An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?
The MOST important information for influencing management’s support of information security is:
Which of the following is the MOST important characteristic of an effective information security metric?
Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?
Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?
Which of the following is MOST helpful for protecting an enterprise from advanced persistent threats (APTs)?
Which of the following is the MOST effective way to detect information security incidents?
Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?
What is the MOST important consideration when establishing metrics for reporting to the information security strategy committee?
For the information security manager, integrating the various assurance functions of an organization is important PRIMARILY to enable:
Which of the following should be the GREATEST concern for an information security manager when an annual audit reveals the organization's business continuity plan (BCP) has not been reviewed or updated in more than a year?
Which of the following is MOST important to the effectiveness of an information security program?
Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?
Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of
confidentiality?
What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?
Which of the following would provide the MOST value to senior management when presenting the results of a risk assessment?