An organization wants to establish an information security program and has assigned a security analyst to put it in place. What is the NEXT step?
What is the BEST way to plan for power disruptions when implementing a Disaster Recovery Plan (DRP)?
When resolving conflicts, which canon within the ISC2 Code of Ethics requires members to consider duties to principals and Individuals?
Employees at an organization use web based services provided by an affiliate. Which of the following risks is unique to this situation?
During the sales and operations planning (S&OP) process, which of the following tasks is the primary responsibility of the functional representatives on the supply planning team?
Which of the following BEST characterizes the operational benefit of using immutable workloads when working on a cloud-based project?
To gain entry into a building, individuals are required to use a palm scan. This is an example of which type of control?
Zombieload, Meltdown, Spectre, and Fallout are all names of bugs that utilized which of the following types of attack?
An organizations is developing a new software package for a financial institution. What is the FIRST step when modeling threats to this new software package?
The Information Technology (IT) manager of a large organization has been tasked with implementing a distributed third-party Identity As A Service (IDaaS). The local security team is concerned that the Identity Provider (IdP) and resource provider have direct connectivity outside of enterprise control. Which of the following authentication methods BEST address this concern?
During an emergency management and planning session, an organization is discussing how to identify, prevent, prepare for, or respond to emergencies. Which of the following will provide the BEST possible outcome?
APerform drills on a recurring basis.
B.Harden all critical facilities.
C.Outsource to an external organization.
D.Allocate 100% of required funds.
An organization is considering options to outsource their Information Technology (IT) operations. Although they do not sell anything on the Internet, they have a strong requirement in uptime of their application. After the offerings received by the Cloud Service Provider (CSP), the IT manager decided it was mandatory to develop processes to continue operations without access to community or public cloud-based applications. Which of the following arguments MOST likely led the IT manager to make this decision?
Which of the following statements correctly describes the relationship between the strategic plan and the business plan?
Which of the following actions hinders the transition from a push system to a pull system?
An organization has hired a new auditor to review its critical systems infrastructure for vulnerabilities. Which of the following BEST describes the methodology the auditor will use to test whether servers are set up according to the organization's documented policies and standards?