A new regulatory requirement affecting an organization's information security program is released. Which of the following should be the information security manager's FIRST course of action?
Which of the following BEST facilitates the development of a comprehensive information security policy?
An organization has purchased an Internet sales company to extend the sales department. The information security manager's FIRST step to ensure the security policy framework encompasses the new business model is to:
A software vendor has announced a zero-day vulnerability that exposes an organization's critical business systems. The vendor has released an emergency patch. Which of the following should be the information security managers PRIMARY concern?
An information security manager is working to incorporate media communication procedures into the security incident communication plan. It would be MOST important to include:
Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?
The PRIMARY advantage of involving end users in continuity planning is that they:
Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?
Which of the following is the BEST justification for making a revision to a password policy?
Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its cloud services.
Which of the following should be the PRIMARY focus of Company A's information security manager?
Which of the following should an information security manager do FIRST when a mandatory security standard hinders the achievement of an identified business objective?
Which of the following is MOST important to include in security incident escalation procedures?
Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
Which of the following should include contact information for representatives of equipment and software vendors?
Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of
confidentiality?
An organization has determined that fixing a security vulnerability in a critical application is too costly to be feasible, but the impact is material to the business. Which of the following is the MOST appropriate risk treatment?
Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?
An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?
Which of the following is the PRIMARY purpose of an acceptable use policy?
Which of the following will BEST enable an organization to meet incident response requirements when outsourcing its incident response function?
Which of the following presents the GREATEST challenge to a large multinational organization using an automated identity and access management (1AM) system?
While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?
An organization has identified a weakness in the ability of its employees to identify and report cybersecurity incidents. Although training materials have been provided, employees show a lack of interest. Which of the following is the information security manager’s BEST course of action?
Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?
When developing a categorization method for security incidents, the categories MUST:
An organization needs to comply with new security incident response requirements. Which of the following should the information security manager do FIRST?
After a server has been attacked, which of the following is the BEST course of action?
Meeting which of the following security objectives BEST ensures that information is protected against unauthorized disclosure?
A Seat a-hosting organization's data center houses servers, appli
BEST approach for developing a physical access control policy for the organization?
Which of the following is the PRIMARY reason for an information security manager to periodically review existing controls?
Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?
An organization is MOST likely to accept the risk of noncompliance with a new regulatory requirement when:
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
An anomaly-based intrusion detection system (IDS) operates by gathering data on:
Which of the following is an information security manager's MOST important course of action when responding to a major security incident that could disrupt the business?
Which of the following is the MOST important consideration when determining which type of failover site to employ?
Which of the following is the PRIMARY benefit of training service desk staff to recognize incidents?
An organization recently outsourced the development of a mission-critical business application. Which of the following would be the BEST way to test for the existence of backdoors?
Which of the following is the MOST important consideration when briefing executives about the current state of the information security program?
Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?
Which of the following is the BEST indicator of a successful intrusion into an organization's systems?
Which of the following provides the BEST evidence that a recently established infofmation security program is effective?
Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?
An employee clicked on a link in a phishing email, triggering a ransomware attack Which of the following should be the information security?
Which of the following would be MOST useful when determining the business continuity strategy for a large organization's data center?
An information security manager is assessing security risk associated with a cloud service provider. Which of the following is the MOST appropriate reference to consult when performing this assessment?
Which of the following would BEST help to ensure appropriate security controls are built into software?
Which of the following is necessary to ensure consistent protection for an organization's information assets?
A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?
An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
Which of the following will BEST facilitate integrating the information security program into corporate governance?
An organization's disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?
An organization has discovered that a server processing real-time visual data could be vulnerable to a lateral movement stage in a ransomware attack. Which of the following controls BEST mitigates this vulnerability?
Which of the following is the BEST way to compete for funding for an information security program in an organization with limited resources?
An information security manager has identified that security risks are not being treated in a timely manner. Which of the following
An information security team is investigating an alleged breach of an organization's network. Which of the following would be the BEST single source of evidence to review?
Which of the following BEST enables an organization to operate smoothly with reduced capacities when service has been disrupted?
When determining an acceptable risk level which of the following is the MOST important consideration?
Which of the following would BEST ensure that security is integrated during application development?
An organization has remediated a security flaw in a system. Which of the following should be done NEXT?
An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?
The PRIMARY goal of the eradication phase in an incident response process is to:
Which of the following is MOST important to consider when aligning a security awareness program with the organization's business strategy?
Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?
Which of the following has the GREATEST influence on an organization's information security strategy?
Which of the following is MOST important to convey to employees in building a security risk-aware culture?
A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?
Prior to implementing a bring your own device (BYOD) program, it is MOST important to:
Which of the following is MOST important to have in place for an organization's information security program to be effective?
When integrating security risk management into an organization it is MOST important to ensure:
When investigating an information security incident, details of the incident should be shared:
To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:
Which of the following BEST enables an organization to identify and contain security incidents?
In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.
Before relying on this certification, it is MOST important that the information security manager confirms that the:
Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?
Which of the following is the BEST way to obtain support for a new organization-wide information security program?
When developing an asset classification program, which of the following steps should be completed FIRST?
To effectively manage an organization's information security risk, it is MOST important to:
Of the following, who should be assigned as the owner of a newly identified risk related to an organization's new payroll system?
Which of the following is the BEST way to determine the effectiveness of an incident response plan?
Which of the following is the BEST way to determine if an information security profile is aligned with business requirements?
A new risk has been identified in a high availability system. The BEST course of action is to:
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
Which of the following is MOST important to include in an information security strategy?
Which of the following BEST enables an organization to determine what activities and changes have occurred on a system during a cybersecurity incident?
Which of the following is the BEST starting point for a newly hired information security manager who has been tasked with identifying and addressing network vulnerabilities?
To inform a risk treatment decision, which of the following should the information security manager compare with the organization's risk appetite?
Of the following, who is MOST appropriate to own the risk associated with the failure of a privileged access control?
An incident response team has established that an application has been breached. Which of the following should be done NEXT?
Which of the following is the MOST effective way to ensure information security policies are understood?
Which of the following should be done FIRST when implementing a security program?
When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
Which of the following is the MOST important consideration during the design phase of a business impact analysis (BIA)?
Which of the following is a PRIMARY benefit of managed security solutions?
A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?
Application data integrity risk is MOST directly addressed by a design that includes:
For an e-business that requires high availability, which of the following design principles is BEST?
A finance department director has decided to outsource the organization's budget application and has identified potential providers. Which of the following actions should be initiated FIRST by IN information security manager?
Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?
A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?
Who has the PRIMARY authority to decide if additional risk treatments are required to mitigate an identified risk?
Threat and vulnerability assessments are important PRIMARILY because they are:
An organization is aligning its incident response capability with a public cloud service provider. What should be the information security manager's FIRST course of action?
Which of the following is the PRIMARY reason to conduct a post-incident review?
Network isolation techniques are immediately implemented after a security breach to:
Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?
During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:
An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?
Which of the following is the BEST reason to implement an information security architecture?
Which of the following is MOST helpful in determining whether a phishing email is malicious?
Which of the following should have the MOST influence on an organization's response to a new industry regulation?
When deciding to move to a cloud-based model, the FIRST consideration should be:
The categorization of incidents is MOST important for evaluating which of the following?
Which of the following should be an information security manager's PRIMARY concern when an organization is expanding business to a new country?
Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?
Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?
Which of the following metrics is MOST appropriate for evaluating the incident notification process?
Which of the following is the MOST important reason for an information security manager to archive and retain the organization's electronic communication and email data?
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
Senior management wants to thoroughly test a disaster recovery plan (DRP) for a mission-critical system. Which of the following would provide the MOST reliable results?
What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?
An online bank identifies a successful network attack in progress. The bank should FIRST:
Which of the following is the MOST likely reason for a vulnerability scanner to return incomplete results?
When drafting the corporate privacy statement for a public website, which of the following MUST be included?
A penetration test against an organization's external web application shows several vulnerabilities. Which of the following presents the GREATEST concern?
A global organization is considering its geopolitical security risks. Which of the following is the information security manager's BEST approach?
The PRIMARY benefit of integrating information security activities into change management processes is to:
Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?
Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?
Which of the following is the BEST approach for managing user access permissions to ensure alignment with data classification?
A new information security manager finds that the organization tends to use short-term solutions to address problems. Resource allocation and spending are not effectively tracked, and there is no assurance that compliance requirements are being met. What should be done FIRST to reverse this bottom-up approach to security?
Which of the following control types should be considered FIRST for aligning employee behavior with an organization's information security objectives?
Which of the following is MOST important for an information security manager to consider when reviewing a security investment plan?
The MOST useful technique for maintaining management support for the information security program is:
After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?
From an information security perspective, legal issues associated with a transborder flow of technology-related items are MOST often
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?
An organization is considering the feasibility of implementing a big data solution to analyze customer data. In order to support this initiative, the information security manager should FIRST:
What should an information security manager do FIRST when an organization is planning to use a third-party cloud computing service for a critical business process?
Which of the following processes is MOST important for the success of a business continuity plan (BCP)?
Which of the following is the MOST important issue in a penetration test?
For which of the following is it MOST important that system administrators be restricted to read-only access?
Which of the following BEST ensures timely and reliable access to services?
Which is following should be an information security manager's PRIMARY focus during the development of a critical system storing highly confidential data?
Which of the following is the FIRST step in developing a business continuity plan (BCP)?
Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?
The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
If the investigation of an incident is not completed within the time allocated in the incident response plan, which of the following actions should be taken by the incident response team?
Which of the following is the MOST critical consideration when shifting IT operations to an Infrastructure as a Service (laaS) model hosted in a foreign country?
An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?
Which of the following is the PRIMARY objective of a cyber resilience strategy?
Which of the following BEST enables an information security manager to obtain organizational support for the implementation of security controls?
Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?
Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:
Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?
Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
An information security manager is MOST likely to obtain approval for a new security project when the business case provides evidence of:
Which of the following should be the MOST important consideration of business continuity management?
The PRIMARY consideration when responding to a ransomware attack should be to ensure:
Which of the following is MOST important to maintain integration among the incident response plan, business continuity plan (BCP). and disaster recovery plan (DRP)?
An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?
An information security manager has confirmed the organization's cloud provider has unintentionally published some of the organization's business data. Which of the following should be done NEXT?
In which cloud model does the cloud service buyer assume the MOST security responsibility?
Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?
Which of the following is MOST effective in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application?
Which of the following is the BEST option to lower the cost to implement application security controls?
Which risk is introduced when using only sanitized data for the testing of applications?
Which of the following BEST facilitates effective strategic alignment of security initiatives?
Which of the following roles has the PRIMARY responsibility to ensure the operating effectiveness of IT controls?
Which of the following BEST enables the restoration of operations after a limited ransomware incident occurs?
When developing an information security strategy for an organization, which of the following is MOST helpful for understanding where to focus efforts?
An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.
Which of the following should be given immediate focus?
Which of the following is MOST relevant for an information security manager to communicate to the board of directors?
When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?
Which of the following is the MOST important role of the information security manager when the organization is in the process of adopting emerging technologies?
Which of the following is the PRIMARY objective of testing security controls within a critical infrastructure?
A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:
Which is the BEST method to evaluate the effectiveness of an alternate processing site when continuous uptime is required?
Which of the following BEST protects against emerging advanced persistent threat (APT) actors?
An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?
Which of the following is the BEST strategy when determining an organization's approach to risk treatment?
The results of a risk assessment for a potential network reconfiguration reveal a high likelihood of sensitive data being compromised. What is the information security manager's BEST course of
action?
Which of the following is MOST likely to reduce the effectiveness of a SIEM system?
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
When updating the information security policy to accommodate a new regulation, the information security manager should FIRST:
During which of the following development phases is it MOST challenging to implement security controls?
An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?
An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?
Which of the following activities is designed to handle a control failure that leads to a breach?
An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?
Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?
Which of the following is a function of the information security steering committee?
An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification for granting an exception to the policy?
An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:
• A bad actor broke into a business-critical FTP server by brute forcing an administrative password
• The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
• The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
• After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail
Which of the following could have been prevented by conducting regular incident response testing?
Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?
What type of control is being implemented when a security information and event management (SIEM) system is installed?
Which of the following tasks should be performed once a disaster recovery plan (DRP) has been developed?
Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
Which of the following BEST enables an organization to determine the costs of downtime for a critical application?
Which of the following defines the triggers within a business continuity plan (BCP)? @
Which of the following is the PRIMARY reason to assign a risk owner in an organization?
After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:
Which of the following is MOST important to the effectiveness of an information security steering committee?
An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?
Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?
An incident response plan is being developed for servers hosting sensitive information. In the event of a breach, who should make the decision to shut down the system?
Which of the following is MOST important when responding to a major security incident?
When is the BEST time to verify that a production system's security mechanisms meet control objectives?
How would the information security program BEST support the adoption of emerging technologies?
An organization is planning to outsource network management to a service provider. Including which of the following in the contract would be the MOST effective way to mitigate information security risk?
Which of the following should be the GREATEST concern for an information security manager when an annual audit reveals the organization's business continuity plan (BCP) has not been reviewed or updated in more than a year?
Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?
Which of the following is the BEST way lo monitor for advanced persistent threats (APT) in an organization?
Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?
A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?
Which of the following BEST enables an organization to effectively manage emerging cyber risk?
An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?
The use of a business case to obtain funding for an information security investment is MOST effective when the business case:
A common drawback of email software packages that provide native encryption of messages is that the encryption:
Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?
In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
Which of the following should be established FIRST when implementing an information security governance framework?
What is the PRIMARY objective of implementing standard security configurations?
Business objectives and organizational risk appetite are MOST useful inputs to the development of information security:
The MOST appropriate time to conduct a disaster recovery test would be after:
Which of the following is the BEST way to help ensure alignment of the information security program with organizational objectives?
Which of the following should be considered FIRST when recovering a compromised system that needs a complete rebuild?
Which of the following has the GREATEST impact on efforts to improve an organization's security posture?
Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?
In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
To prepare for a third-party forensics investigation following an incident involving malware, the incident response team should:
During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
Which of the following factors would have the MOST significant impact on an organization's information security governance mode?
When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?
Which of the following is MOST important when designing security controls for new cloud-based services?
Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?
An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?
Which of the following provides the MOST useful information for identifying security control gaps on an application server?
An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:
Which of the following should be done FIRST when developing a business continuity plan (BCP)?
An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?
An organization has decided to implement an Internet of Things (IoT) solution to remain competitive in the market. Which of the following should information security do FIRST?
An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?
Which of the following is MOST important to determine following the discovery and eradication of a malware attack?
How does an organization PRIMARILY benefit from the creation of an information security steering committee?
Which of the following is the PRIMARY role of an information security manager in a software development project?
Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?
The PRIMARY reason to properly classify information assets is to determine:
When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?
An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?
An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?
What is the role of the information security manager in finalizing contract negotiations with service providers?
Which of the following has the MOST influence on the inherent risk of an information asset?
An organization engages a third-party vendor to monitor and support a financial application under scrutiny by regulators. Which of the following controls would MOST effectively manage risk to the organization?