Which of the following is MOST important to ensure incident management readiness?
Which of the following is the MOST effective way to identify changes in an information security environment?
In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?
An employee who is a remote user has copied financial data from the corporate server to a laptop using virtual private network (VPN) connectivity. Which of the following is the MOST important factor to determine if it should be classified as a data leakage incident?
An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?
Which of the following is MOST important when designing security controls for new cloud-based services?
When developing an asset classification program, which of the following steps should be completed FIRST?
To ensure that a new application complies with information security policy, the BEST approach is to:
Which of the following should be done FIRST when developing a business continuity plan (BCP)?
An organization has identified a weakness in the ability of its employees to identify and report cybersecurity incidents. Although training materials have been provided, employees show a lack of interest. Which of the following is the information security manager’s BEST course of action?
Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?
An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?
An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?
Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
Which of the following is the MOST important consideration when determining which type of failover site to employ?