Which of the following would BEST ensure that security is integrated during application development?
An information security manager has been notified that two senior executives have the ability to elevate their own privileges in the corporate accounting system, in violation of policy. What is the FIRST step to address this issue?
Which of the following is the BEST approach for governing noncompliance with security requirements?
Which or the following is MOST important to consider when determining backup frequency?
Which of the following is the PRIMARY reason to use a phased incident recovery approach?
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be defined in the business continuity plan (BCP) to manage this requirement?
Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?
A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?
Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?
Which of the following would provide the BEST evidence to senior management that security control performance has improved?
Network isolation techniques are immediately implemented after a security breach to:
While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?
Which of the following would BEST help to ensure appropriate security controls are built into software?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?
Identifying which of the following BEST enables a cyberattack to be contained?
Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
Which of the following is an information security manager's MOST important course of action after receiving information about a new cybersecurity threat?
Which of the following has the GREATEST influence on an organization's information security strategy?
Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?
Which of the following is the BEST approach for managing user access permissions to ensure alignment with data classification?
Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?
Senior management has expressed concern that the organization's intrusion prevention system (IPS) may repeatedly disrupt business operations Which of the following BEST indicates that the information security manager has tuned the system to address this concern?
Which of the following is the MOST effective way to identify changes in an information security environment?
An information security manager is alerted to multiple security incidents across different business units, with unauthorized access to sensitive data and potential data exfiltration from critical systems. Which of the following is the BEST course of action to appropriately classify and prioritize these incidents?
Which of the following is the PRIMARY benefit of implementing an information security governance framework?
Which of the following BEST enables the restoration of operations after a limited ransomware incident occurs?
How does an incident response team BEST leverage the results of a business impact analysis (BIA)?
An organization has remediated a security flaw in a system. Which of the following should be done NEXT?
Which of the following is the MOST important reason for logging firewall activity?
Which of the following is the BEST indication that an organization has integrated information security governance with corporate governance?
The MOST important reason for having an information security manager serve on the change management committee is to:
Which of the following should be the FIRST step in patch management procedures when receiving an emergency security patch?
Which of the following is MOST important for guiding the development and management of a comprehensive information security program?
An employee who is a remote user has copied financial data from the corporate server to a laptop using virtual private network (VPN) connectivity. Which of the following is the MOST important factor to determine if it should be classified as a data leakage incident?
An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?
Which of the following should be of GREATEST concern regarding an organization's security controls?
Which of the following BEST determines an information asset's classification?
To improve the efficiency of the development of a new software application, security requirements should be defined:
In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?
An organization has just updated its backup capability to a new cloud-based solution. Which of the following tests will MOST effectively verify this change is working as intended?
An incident response policy should include:
A PRIMARY purpose of creating security policies is to:
Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?
Which of the following is the GREATEST benefit of information asset classification?
Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?
An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?
Which of the following is the PRIMARY responsibility of the information security function when an organization adopts emerging technologies?
Which of the following is the MOST important objective when planning an incident response program?
Which of the following BEST supports investments in an information security program?
An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:
Which of the following roles is MOST appropriate to determine access rights for specific users of an application?
Which of the following is the BEST indicator of an emerging incident?
In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
An organization's research department plans to apply machine learning algorithms on a large data set containing customer names and purchase history. The risk of personal data leakage is considered high impact. Which of the following is the BEST risk treatment option in this situation?
Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?
Which of the following is an information security manager's MOST important course of action when responding to a major security incident that could disrupt the business?
Which of the following is the PRIMARY impact of organizational culture on the effectiveness of an information security program?
Which of the following is the PRIMARY objective of a cyber resilience strategy?
Which of the following is the MOST appropriate risk response when the risk impact has been determined to be immaterial and the likelihood is very low?
A security incident has been reported within an organization. When should an information security manager contact the information owner?
Which of the following would MOST effectively ensure that a new server is appropriately secured?
Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?
Which of the following presents the GREATEST challenge to a security operations center's wna GY of potential security breaches?
Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?
Which of the following is the BEST way to ensure the capability to restore clean data after a ransomware attack?
Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?
An incident response plan is being developed for servers hosting sensitive information. In the event of a breach, who should make the decision to shut down the system?
When choosing the best controls to mitigate risk to acceptable levels, the information security manager's decision should be MAINLY driven by:
An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?
In which cloud model does the cloud service buyer assume the MOST security responsibility?
Which of the following should be updated FIRST when aligning the incident response plan with the corporate strategy?
An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.
Which of the following should be given immediate focus?
Which of the following is the MOST important outcome of a post-incident review?
Embedding security responsibilities into job descriptions is important PRIMARILY because it:
Which of the following is MOST important when defining how an information security budget should be allocated?
What should an information security manager do FIRST when an organization is planning to use a third-party cloud computing service for a critical business process?
An online trading company discovers that a network attack has penetrated the firewall. What should be the information security manager's FIRST response?
Which of the following is the BEST course of action for an information security manager to align security and business goals?
Which of the following is the MOST effective way to prevent information security incidents?
Which of the following BEST enables an organization to continuously assess the information security risk posture?
Which of the following is the PRIMARY reason to regularly update business continuity and disaster recovery documents?
The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
An organization has discovered that a server processing real-time visual data could be vulnerable to a lateral movement stage in a ransomware attack. Which of the following controls BEST mitigates this vulnerability?
Prior to implementing a bring your own device (BYOD) program, it is MOST important to:
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?
The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:
Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?
A common drawback of email software packages that provide native encryption of messages is that the encryption:
An organization engages a third-party vendor to monitor and support a financial application under scrutiny by regulators. Which of the following controls would MOST effectively manage risk to the organization?
Which of the following is the BEST indication of effective information security governance?
Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?
Which of the following is MOST important to convey to employees in building a security risk-aware culture?
When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:
An organization has determined that fixing a security vulnerability in a critical application is too costly to be feasible, but the impact is material to the business. Which of the following is the MOST appropriate risk treatment?
Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?
Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?
An organization has decided to implement an Internet of Things (IoT) solution to remain competitive in the market. Which of the following should information security do FIRST?
Which of the following will BEST facilitate timely and effective incident response?
A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?
Security administration efforts will be greatly reduced following the deployment of which of the following techniques?
When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
Which of the following would BEST support the business case for an increase in the information security budget?
To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?
After logging in to a web application, additional authentication is checked at various application points. Which of the following is the PRIMARY reason for such an approach?
When drafting the corporate privacy statement for a public website, which of the following MUST be included?
Reverse lookups can be used to prevent successful:
Which of the following should be the PRIMARY focus of a status report on the information security program to senior management?
An organization is leveraging tablets to replace desktop computers shared by shift-based staff These tablets contain critical business data and are inherently at increased risk of theft Which of the following will BEST help to mitigate this risk''
Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?
Which of the following BEST helps to enable the desired information security culture within an organization?
An organization would like to invest in a new emerging technology. Which of the following is MOST important for the information security manager to consider when evaluating its impact?
When investigating an information security incident, details of the incident should be shared:
Which of the following is a desired outcome of information security governance?
An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?
To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
What is the PRIMARY benefit to an organization that maintains an information security governance framework?
Which of the following BEST minimizes information security risk in deploying applications to the production environment?
An incident response team has established that an application has been breached. Which of the following should be done NEXT?
Which of the following is CRITICAL to ensure the appropriate stakeholder makes decisions during a cybersecurity incident?
Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?
An experienced information security manager joins a new organization and begins by conducting an audit of all key IT processes. Which of the following findings about the vulnerability management program should be of GREATEST concern?
Which of the following is the BEST reason to implement an information security architecture?
An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:
Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?
Which of the following has the MOST influence on the inherent risk of an information asset?
A project team member notifies the information security manager of a potential security risk that has not been included in the risk register. Which of the following should the information security manager do FIRST?
Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?
Recovery time objectives (RTOs) are BEST determined by:
What is the MOST important consideration for an organization operating in a highly regulated market when new regulatory requirements with high impact to the business need to be implemented?
Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be in the business continuity plan (BCP) to manage this requirement?
The PRIMARY benefit of integrating information security activities into change management processes is to:
Which of the following is the MOST critical factor for information security program success?
An information security manager is assessing security risk associated with a cloud service provider. Which of the following is the MOST appropriate reference to consult when performing this assessment?
A risk assessment exercise has identified the threat of a denial of service (DoS) attack Executive management has decided to take no further action related to this risk. The MO ST likely reason for this decision is
Which of the following sources is MOST useful when planning a business-aligned information security program?
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
Which of the following BEST enables an organization to transform its culture to support information security?
An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?
Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?
Which of the following tools would be MOST helpful to an incident response team?
Which of the following is the MOST important requirement for a successful security program?
When assigning a risk owner, the MOST important consideration is to ensure the owner has:
Which of the following is MOST important to ensure incident management readiness?
When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?
Which of the following is MOST important when designing security controls for new cloud-based services?
Penetration testing is MOST appropriate when a:
Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?
Which of the following BEST indicates that an information security governance framework has been successfully implemented?
Which of the following should an information security manager do FIRST when noncompliance with security standards is identified?
An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?
Which of the following is the PRIMARY reason to perform regular reviews of the cybersecurity threat landscape?
Which of the following is the GREATEST inherent risk when performing a disaster recovery plan (DRP) test?
In addition to executive sponsorship and business alignment, which of the following is MOST critical for information security governance?
Which of the following BEST enables an organization to identify and contain security incidents?
Which of the following will BEST enable an organization to meet incident response requirements when outsourcing its incident response function?
Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?
Which of the following BEST enables an information security manager to demonstrate the effectiveness of the information security and risk program to senior management?
Which of the following should be done FIRST when establishing a new data protection program that must comply with applicable data privacy regulations?
Which of the following BEST illustrates residual risk within an organization?
Which of the following is the MOST effective defense against malicious insiders compromising confidential information?
Which of the following is the BEST approach to make strategic information security decisions?
Which of the following is MOST important to ensure the alignment of an information security program with the organizational strategy?
When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?
The PRIMARY purpose of implementing information security governance metrics is to:
To help ensure that an information security training program is MOST effective, its contents should be:
Which of the following is MOST helpful in determining the criticality of an organization's business functions?
The PRIMARY advantage of involving end users in continuity planning is that they:
A business continuity plan (BCP) should contain:
Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?
Which of the following is MOST appropriate for an organization to consider when defining incident classification and categorization levels?
Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:
What should be the GREATEST concern for an information security manager of a large multinational organization when outsourcing data processing to a cloud service provider?
An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?
The PRIMARY purpose for deploying information security metrics is to:
After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:
Which of the following MUST be established to maintain an effective information security governance framework?
Which of the following messages would be MOST effective in obtaining senior management's commitment to information security management?
Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?
Which of the following presents the GREATEST challenge to the recovery of critical systems and data following a ransomware incident?
Which of the following BEST facilitates the development of a comprehensive information security policy?
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
When analyzing the emerging risk and threat landscape, an information security manager should FIRST:
An information security program is BEST positioned for success when it is closely aligned with:
Which of the following is the BEST way to obtain organization-wide support for an information security program?
Which of the following should be considered FIRST when recovering a compromised system that needs a complete rebuild?
Which of the following is the BEST option to lower the cost to implement application security controls?
Before approving the implementation of a new security solution, senior management requires a business case. Which of the following would BEST support the justification for investment?
Which of the following should an information security manager do FIRST to address the risk associated with a new third-party cloud application that will not meet organizational security requirements?
Which of the following risk responses is an example of risk transfer?
Which of the following BEST demonstrates that an anti-phishing campaign is effective?
Which of the following is the BEST way to obtain support for a new organization-wide information security program?
Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?
Which of the following defines the triggers within a business continuity plan (BCP)? @
Who is BEST suited to determine how the information in a database should be classified?
Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of
confidentiality?
An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?
An organization is aligning its incident response capability with a public cloud service provider. What should be the information security manager's FIRST course of action?
Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?
Which of the following is MOST helpful for aligning security operations with the IT governance framework?
Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?
An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?
Which of the following should be the PRIMARY basis for determining the value of assets?
To help ensure that an information security training program is MOST effective its contents should be
An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?
Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?
An organization has identified a weakness in the ability of its employees to identify and report cybersecurity incidents. Although training materials have been provided, employees show a lack of interest. Which of the following is the information security manager’s BEST course of action?
What should be an information security manager's MOST important consideration when developing a multi-year plan?
The MAIN benefit of implementing a data loss prevention (DLP) solution is to:
Which of the following is MOST important for the effective implementation of an information security governance program?
Which of the following roles has the PRIMARY responsibility to ensure the operating effectiveness of IT controls?
An organization's quality process can BEST support security management by providing:
Which of the following should be the PRIMARY objective when establishing a new information security program?
An organization has identified a large volume of old data that appears to be unused. Which of the following should the information
security manager do NEXT?
How does an organization PRIMARILY benefit from the creation of an information security steering committee?
Which of the following is MOST important to the successful implementation of an information security program?
Which of the following is a PRIMARY benefit of managed security solutions?
An organization has updated its business goals in the middle of the fiscal year to respond to changes in market conditions. Which of the following is MOST important for the information security manager to update in support of the new goals?
Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?
The PRIMARY objective of timely declaration of a disaster is to:
Which of the following should be the PRIMARY focus of an organization with immature incident detection capabilities?
Which of the following is a function of the information security steering committee?
Which is MOST important to identify when developing an effective information security strategy?
An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?
Which of the following BEST indicates that information security governance and corporate governance are integrated?
The MOST appropriate time to conduct a disaster recovery test would be after:
Which of the following is the MOST likely reason for a vulnerability scanner to return incomplete results?
What should be the FIRST step when an Internet of Things (loT) device in an organization's network is confirmed to have been hacked?
Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?
A forensic examination of a PC is required, but the PC has been switched off. Which of the following should be done FIRST?
When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?
Which of the following is the BEST indication ofa successful information security culture?
What is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?
Which of the following should include contact information for representatives of equipment and software vendors?
Which of the following is MOST important to have in place as a basis for developing an effective information security program that supports the organization's business goals?
Which of the following is the BEST indication of an effective information security awareness training program?
Which of the following is the BEST way to build a risk-aware culture?
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?
When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?
An incident management team is alerted ta a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?
Which of the following is the MOST important outcome of effective risk treatment?
Which of the following is MOST important to include in monthly information security reports to the board?
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
A PRIMARY benefit of adopting an information security framework is that it provides:
To prepare for a third-party forensics investigation following an incident involving malware, the incident response team should:
Which of the following should be the FIRST step in developing an information security strategy?
A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager's FIRST step in addressing the issue should be to:
Which of the following should be done FIRST to prioritize response to incidents?
Which of the following processes BEST supports the evaluation of incident response effectiveness?
Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?
Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?
Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?
Which of the following is an example of a change to the external threat landscape?
Which of the following BEST supports information security management in the event of organizational changes in security personnel?
Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?
A new information security reporting requirement will soon become effective. Which of the following should be the information security manager's FIRST action?
Prior to conducting a forensic examination, an information security manager should:
Which of the following is the PRIMARY reason for an information security manager to periodically review existing controls?
Data entry functions for a web-based application have been outsourced to a third-party service provider who will work from a remote site Which of the following issues would be of GREATEST concern to an information security manager?
A technical vulnerability assessment on a personnel information management server should be performed when:
Which of the following BEST enables an organization to maintain legally admissible evidence7
During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:
An organization is MOST likely to accept the risk of noncompliance with a new regulatory requirement when:
The contribution of recovery point objective (RPO) to disaster recovery is to:
Which of the following is the FIRST step in developing a business continuity plan (BCP)?
Which of the following should have the MOST influence on the development of information security policies?
When properly implemented, secure transmission protocols protect transactions:
Which of the following will BEST facilitate integrating the information security program into corporate governance?
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
The information security manager of a multinational organization has been asked to consolidate the information security policies of its regional locations. Which of the following would be of
GREATEST concern?
An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?
Which of the following provides the BEST evidence that a recently established infofmation security program is effective?
Which of the following would be MOST helpful to identify worst-case disruption scenarios?