Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?
Which of the following presents the GREATEST challenge to a security operations center's wna GY of potential security breaches?
What is the PRIMARY benefit to an organization that maintains an information security governance framework?
Which of the following factors would have the MOST significant impact on an organization's information security governance mode?
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
Capacity planning would prevent:
An information security manager is assessing security risk associated with a cloud service provider. Which of the following is the MOST appropriate reference to consult when performing this assessment?
The results of a risk assessment for a potential network reconfiguration reveal a high likelihood of sensitive data being compromised. What is the information security manager's BEST course of
action?
While responding to a high-profile security incident, an information security manager observed several deficiencies in the current incident response plan. When would be the BEST time to update the plan?
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
To prepare for a third-party forensics investigation following an incident involving malware, the incident response team should:
Security administration efforts will be greatly reduced following the deployment of which of the following techniques?
A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?
Which of the following is MOST important to have in place for an organization's information security program to be effective?
When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?
Which of the following should be of GREATEST concern regarding an organization's security controls?
Prior to implementing a bring your own device (BYOD) program, it is MOST important to:
Which of the following should have the MOST influence on an organization's response to a new industry regulation?
Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?
Which of the following is MOST appropriate to communicate to senior management regarding information risk?
Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?
Which of the following should an information security manager do FIRST to address the risk associated with a new third-party cloud application that will not meet organizational security requirements?
Which of the following is the MOST critical consideration when shifting IT operations to an Infrastructure as a Service (laaS) model hosted in a foreign country?
Which of the following is MOST important to have in place when conducting a security control assessment of a system?
Which of the following is MOST likely to reduce the effectiveness of a SIEM system?
Which of the following roles has the PRIMARY responsibility to ensure the operating effectiveness of IT controls?
Which of the following is an example of a change to the external threat landscape?
An information security manager learns of a new standard related to an emerging technology the organization wants to implement. Which of the following should the information security manager recommend be done FIRST?
Recovery time objectives (RTOs) are BEST determined by:
Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
A risk owner has accepted a large amount of risk due to the high cost of controls. Which of the following should be the information security manager's PRIMARY focus in this situation?
Which of the following is the MOST effective defense against malicious insiders compromising confidential information?
Which of the following is MOST important in order to obtain senior leadership support when presenting an information security strategy?
Which of the following is the MOST important detail to capture in an organization's risk register?
Senior management has just accepted the risk of noncompliance with a new regulation What should the information security manager do NEX*P
The PRIMARY objective of performing a post-incident review is to:
An information security policy was amended recently to support an organization's new information security strategy. Which of the following should be the information security manager's NEXT step?
An organization is MOST likely to accept the risk of noncompliance with a new regulatory requirement when:
An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?
Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?
An organization recently outsourced the development of a mission-critical business application. Which of the following would be the BEST way to test for the existence of backdoors?
The PRIMARY purpose for conducting cybersecurity risk assessments is to:
Which of the following is the MOST important outcome of effective risk treatment?
Which of the following is the BEST approach to make strategic information security decisions?
Which of the following is MOST helpful for protecting an enterprise from advanced persistent threats (APTs)?
Which of the following is the MOST essential element of an information security program?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
An information security manager has identified that security risks are not being treated in a timely manner. Which of the following
The BEST way to integrate information security governance with corporate governance is to ensure:
What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?
Which of the following is the BEST indication of effective information security governance?
Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?
An organization has an ongoing security awareness training program. Employee participation has been decreasing over the year, while the number of malware and phishing incidents from email has been increasing. What is the information security manager's BEST course of action?
Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?
Management would like to understand the risk associated with engaging an Infrastructure-as-a-Service (laaS) provider compared to hosting internally. Which of the following would provide the BEST method of comparing risk scenarios?
An organization has updated its business goals in the middle of the fiscal year to respond to changes in market conditions. Which of the following is MOST important for the information security manager to update in support of the new goals?
The department head of application development has decided to accept the risks identified in a recent assessment. No recommendations will be implemented, even though the recommendations are required by regulatory oversight. What should the information security manager do NEXT?
Which of the following is established during the preparation phase of an incident response plan?
Which of the following is the BEST indication of an effective information security awareness training program?
Which of the following is the PRIMARY objective of testing security controls within a critical infrastructure?
Which of the following is the PRIMARY reason for an information security manager to periodically review existing controls?
Which of the following is MOST helpful for aligning security operations with the IT governance framework?
Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?
An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?
Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?
Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?
Which of the following BEST determines an information asset's classification?
Which of the following is MOST important when designing an information security governance framework?
In which cloud model does the cloud service buyer assume the MOST security responsibility?
An organization is experiencing a sharp increase in incidents related to phishing messages. The root cause is an outdated email filtering system that is no longer supported by the vendor. Which of the following should be the information security manager's FIRST course of action?
Which of the following is the GREATEST value provided by a security information and event management (SIEM) system?
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
Which of the following is an information security manager's MOST important course of action when responding to a major security incident that could disrupt the business?
Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?
Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?
Which of the following is MOST important to consider when defining control objectives?
An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?
Which of the following should be the FIRST step in developing an information security strategy?
Which of the following is the BEST starting point for a newly hired information security manager who has been tasked with identifying and addressing network vulnerabilities?
A finance department director has decided to outsource the organization's budget application and has identified potential providers. Which of the following actions should be initiated FIRST by IN information security manager?
Which of the following is the BEST reason for senior management to support a business case for developing a monitoring system for a critical application?
Which of the following is MOST helpful in the development of a cost-effective information security strategy that is aligned with business requirements?
In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:
The PRIMARY goal to a post-incident review should be to:
Which type of backup BEST enables an organization to recover data after a ransomware attack?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
A PRIMARY benefit of adopting an information security framework is that it provides:
What should an information security manager verify FIRST when reviewing an information asset management program?
Which of the following should be the MOST important consideration of business continuity management?
A financial company executive is concerned about recently increasing cyberattacks and needs to take action to reduce risk. The organization would BEST respond by:
The PRIMARY consideration when responding to a ransomware attack should be to ensure:
Which of the following would BEST enable the timely execution of an incident response plan?
The PRIMARY goal when conducting post-incident reviews is to identify:
An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?
Which of the following is the PRIMARY preventive method to mitigate risks associated with privileged accounts?
Which of the following is the BEST evidence of alignment between corporate and information security governance?
Which of the following BEST illustrates residual risk within an organization?
Which of the following is the PRIMARY benefit of implementing an information security governance framework?
Which of the following is MOST important when defining how an information security budget should be allocated?
Which of the following is the MOST important issue in a penetration test?
Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?
Which of the following is the BEST indicator of an organization's information security status?
Business objectives and organizational risk appetite are MOST useful inputs to the development of information security:
Which of the following is the BEST indicator of an emerging incident?
When analyzing the emerging risk and threat landscape, an information security manager should FIRST:
Which of the following is MOST important to the successful implementation of an information security program?
A new information security reporting requirement will soon become effective. Which of the following should be the information security manager's FIRST action?
When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?
A PRIMARY purpose of creating security policies is to:
Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
Which of the following is the BEST approach for managing user access permissions to ensure alignment with data classification?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
An information security manager has been tasked with developing materials to update the board, regulatory agencies, and the media about a security incident. Which of the following should the information security manager do FIRST?
Which of the following should be done FIRST when establishing an information security governance framework?
An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?
Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?
What will BEST facilitate the success of new security initiatives?
Which of the following has the GREATEST influence on the successful integration of information security within the business?
Which of the following is MOST important in increasing the effectiveness of incident responders?
Detailed business continuity plans (BCPs) should be PRIMARILY based on:
An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?
A risk assessment exercise has identified the threat of a denial of service (DoS) attack Executive management has decided to take no further action related to this risk. The MO ST likely reason for this decision is
An organization has decided to implement an Internet of Things (IoT) solution to remain competitive in the market. Which of the following should information security do FIRST?
The MOST effective tools for responding to new and advanced attacks are those that detect attacks based on:
Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?
An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization's critical systems?
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
Which of the following is MOST helpful in determining an organization's current capacity to mitigate risks?
An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
Which of the following is MOST important when responding to a major security incident?
Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?
Which of the following is MOST helpful to identify whether information security policies have been followed?
Which of the following should be established FIRST when implementing an information security governance framework?
Which of the following is the BEST way to build a risk-aware culture?
Which of the following is MOST effective in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application?
An information security manager determines there are a significant number of exceptions to a newly released industry-required security standard. Which of the following should be done NEXT?
The PRIMARY objective of performing a post-incident review is to:
The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness training program is to include:
Which of the following BEST indicates that an information security governance framework has been successfully implemented?
Which of the following would be MOST important to include in a proposal justifying investments for an organization's information security program?
Spoofing should be prevented because it may be used to:
A balanced scorecard MOST effectively enables information security:
Which of the following BEST facilitates the effective execution of an incident response plan?
Which of the following would be of GREATEST assistance in determining whether to accept residual risk of a critical security system?
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
Which of the following backup methods requires the MOST time to restore data for an application?
A new type of ransomware has infected an organization's network. Which of the following would have BEST enabled the organization to detect this situation?
Which of the following is a function of the information security steering committee?
A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:
An employee clicked on a link in a phishing email, triggering a ransomware attack Which of the following should be the information security?
Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?
Which of the following is the BEST way to help ensure alignment of the information security program with organizational objectives?
Which of the following is MOST important for an information security manager to consider when reviewing a security investment plan?
Which of the following is the MOST important outcome of a post-incident review?
A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?
An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?
An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:
Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?
Which of the following is the BEST way to obtain support for a new organization-wide information security program?
Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?
Which of the following should be the MOST important consideration when reviewing an information security strategy?
Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?
A new application has entered the production environment with deficient technical security controls. Which of the following is MOST Likely the root cause?
Which of the following is MOST important to the effectiveness of an information security program?
Which of the following BEST indicates misalignment of security policies with business objectives?
Which of the following is MOST important when designing security controls for new cloud-based services?
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?
An organization plans to leverage popular social network platforms to promote its products and services. Which of the following is the BEST course of action for the information security manager to support this initiative?
Which of the following metrics is MOST appropriate for evaluating the incident notification process?
An organization engages a third-party vendor to monitor and support a financial application under scrutiny by regulators. Which of the following controls would MOST effectively manage risk to the organization?
Which of the following has the MOST influence on the information security investment process?
Which of the following will result in the MOST accurate controls assessment?
Which of the following is the FIRST step in developing a business continuity plan (BCP)?
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
Which of the following is necessary to ensure consistent protection for an organization's information assets?
Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?
Which of the following BEST facilitates effective incident response testing?
The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?
When choosing the best controls to mitigate risk to acceptable levels, the information security manager's decision should be MAINLY driven by:
Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?
In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.
Before relying on this certification, it is MOST important that the information security manager confirms that the:
A newly appointed information security manager of a retailer with multiple stores discovers an HVAC (heating, ventilation, and air conditioning) vendor has remote access to the stores to enable real-time monitoring and equipment diagnostics. Which of the following should be the information security manager's FIRST course of action?
Which of the following is the BEST way to compete for funding for an information security program in an organization with limited resources?
When is the BEST time to verify that a production system's security mechanisms meet control objectives?
Which of the following BEST facilitates an information security manager's efforts to obtain senior management commitment for an information security program?
Which of the following components of an information security risk assessment is MOST valuable to senior management?
Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?
Which of the following is the FIRST step when conducting a post-incident review?
When collecting admissible evidence, which of the following is the MOST important requirement?
Which of the following business units should own the data that populates an identity management system?
Which of the following is the BEST reason to implement an information security architecture?
An organization has acquired a new system with strict maintenance instructions and schedules. Where should this information be documented?
An organization has identified IT failures in a call center application. Of the following, who should own this risk?
Prior to conducting a forensic examination, an information security manager should:
A technical vulnerability assessment on a personnel information management server should be performed when:
Which of the following is the MOST important reason for logging firewall activity?
Which of the following BEST enables an organization to effectively manage emerging cyber risk?
A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?
Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?
A software vendor has announced a zero-day vulnerability that exposes an organization's critical business systems. The vendor has released an emergency patch. Which of the following should be the information security managers PRIMARY concern?
An organization has remediated a security flaw in a system. Which of the following should be done NEXT?
Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?
Penetration testing is MOST appropriate when a:
When remote access is granted to a company's internal network, the MOST important consideration should be that access is provided:
An information security manager has been notified that two senior executives have the ability to elevate their own privileges in the corporate accounting system, in violation of policy. What is the FIRST step to address this issue?
Which of the following has the MOST influence on the inherent risk of an information asset?
Which of the following is the BEST way to evaluate the effectiveness of physical and environmental security controls implemented for fire-related disasters?
When developing an incident escalation process, the BEST approach is to classify incidents based on:
Which of the following BEST supports the incident management process for attacks on an organization's supply chain?
Which of the following is the BEST indication of a mature information security program?
An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?
Which of the following has the GREATEST impact on the ability to successfully execute a disaster recovery plan (DRP)?
To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:
Which of the following BEST demonstrates the added value of an information security program?
When defining a security baseline, it is MOST important that the baseline:
Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?
An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?
Which of the following would be MOST useful when determining the business continuity strategy for a large organization's data center?
Which of the following BEST supports investments in an information security program?
Which of the following risk responses is an example of risk transfer?
Which of the following is the BEST course of action when an online company discovers a network attack in progress?
Which of the following should be an information security manager's FIRST course of action when a newly introduced privacy regulation affects the business?
Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?
Which of the following BEST indicates the organizational benefit of an information security solution?
Which of the following would be MOST useful to help senior management understand the status of information security compliance?
Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?
An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?
Which of the following BEST demonstrates that an anti-phishing campaign is effective?
Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?
Data classification is PRIMARILY the responsibility of:
Which of the following tasks would provide a newly appointed information security manager with the BEST view of the organization's existing security posture?
Which of the following is MOST important for building 4 robust information security culture within an organization?
The fundamental purpose of establishing security metrics is to:
Which of the following BEST facilitates the effectiveness of cybersecurity incident response?
Network isolation techniques are immediately implemented after a security breach to:
An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:
Which of the following BEST enables an organization to maintain an appropriate security control environment?
An information security manager has been asked to provide both one-year and five-year plans for the information security program. What is the PRIMARY purpose for the long-term plan?
Which of the following is the PRIMARY benefit of training service desk staff to recognize incidents?
The BEST way to report to the board on the effectiveness of the information security program is to present:
An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?
Which of the following should be done FIRST after a ransomware incident has been successfully contained?
When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?
Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?
Which of the following will ensure confidentiality of content when accessing an email system over the Internet?
Which of the following is the PRIMARY reason to assign a risk owner in an organization?
A new regulatory requirement affecting an organization's information security program is released. Which of the following should be the information security manager's FIRST course of action?
An information security manager is updating the organization's incident response plan. Which of the following is the BEST way to validate that the process and procedures provided by IT and business units are complete, accurate, and known by all responsible teams?
Which of the following is the MOST important constraint to be considered when developing an information security strategy?
ACISO learns that a third-party service provider did not notify the organization of a data breach that affected the service provider's data center. Which of the following should the CISO do FIRST?
Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?
During which phase of an incident response plan is the root cause determined?
Which of the following should include contact information for representatives of equipment and software vendors?
Which of the following is the GREATEST inherent risk when performing a disaster recovery plan (DRP) test?
Which of the following is the MOST important factor in successfully implementing Zero Trust?
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
Which of the following should an information security manager do FIRST after identifying suspicious activity on a PC that is not in the organization's IT asset inventory?
The PRIMARY purpose for continuous monitoring of security controls is to ensure:
Which of the following should be the PRIMARY goal of information security?
What is the role of the information security manager in finalizing contract negotiations with service providers?
A Seat a-hosting organization's data center houses servers, appli
BEST approach for developing a physical access control policy for the organization?
The PRIMARY objective of a post-incident review of an information security incident is to:
Which of the following sources is MOST useful when planning a business-aligned information security program?
Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
Which of the following is the BEST defense against a brute force attack?
Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?
Which of the following would be the BEST way to reduce the risk of disruption resulting from an emergency system change?
Which of the following is CRITICAL to ensure the appropriate stakeholder makes decisions during a cybersecurity incident?
An experienced information security manager joins a new organization and begins by conducting an audit of all key IT processes. Which of the following findings about the vulnerability management program should be of GREATEST concern?
In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
An organization's disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?
Which of the following tools would be MOST helpful to an incident response team?
After logging in to a web application, additional authentication is checked at various application points. Which of the following is the PRIMARY reason for such an approach?
After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?
An information security team has started work to mitigate findings from a recent penetration test. Which of the following presents the GREATEST risk to the organization?
During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?
Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?
During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?
When assigning a risk owner, the MOST important consideration is to ensure the owner has:
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be defined in the business continuity plan (BCP) to manage this requirement?
Which of the following is MOST important for the effective implementation of an information security governance program?
Which type of system is MOST effective for monitoring cyber incidents based on impact and tracking them until they are closed?
An information security team has confirmed that threat actors are taking advantage of a newly announced critical vulnerability within an application. Which of the following should be done
FIRST?
Reevaluation of risk is MOST critical when there is:
Before approving the implementation of a new security solution, senior management requires a business case. Which of the following would BEST support the justification for investment?