Which of the following would BEST ensure that security is integrated during application development?
Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?
Business objectives and organizational risk appetite are MOST useful inputs to the development of information security:
A global organization is planning to expand its operations into a new country with stricter data protection regulations than those in the headquarters' home country. Which of the following is the BEST approach for adopting these new requirements?
Which of the following is the BEST course of action after management has reviewed an identified risk and determines the risk is below the defined risk appetite?
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
The PRIMARY reason for creating a business case when proposing an information security project is to:
A business impact analysis (BIA) should be periodically executed PRIMARILY to:
Which of the following is the BEST indication of an effective information security awareness training program?
Which of the following is the PRIMARY reason to regularly update business continuity and disaster recovery documents?
Once a suite of security controls has been successfully implemented for an organization's business units, it is MOST important for the information security manager to:
Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
Which of the following processes BEST supports the evaluation of incident response effectiveness?
Which of the following provides the BEST evidence that a recently established infofmation security program is effective?
Which of the following is MOST important to the effectiveness of an information security program?
An information security manager finds that a soon-to-be deployed online application will increase risk beyond acceptable levels, and necessary controls have not been included. Which of the following is the BEST course of action for the information security manager?
Which of the following control types should be considered FIRST for aligning employee behavior with an organization's information security objectives?
An organization has determined that fixing a security vulnerability in a critical application is too costly to be feasible, but the impact is material to the business. Which of the following is the MOST appropriate risk treatment?
Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?