Which of the following should be the NEXT step after a security incident has been reported?
Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?
Which of the following is the BEST indication of a mature information security program?
Spoofing should be prevented because it may be used to:
To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?
Which of the following is MOST important to include in a post-incident review following a data breach?
A penetration test against an organization's external web application shows several vulnerabilities. Which of the following presents the GREATEST concern?
Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?
An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?
Which of the following is the MOST important constraint to be considered when developing an information security strategy?
Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?
Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?
Security administration efforts will be greatly reduced following the deployment of which of the following techniques?
Which of the following BEST enables staff acceptance of information security policies?
Which of the following will BEST facilitate timely and effective incident response?
Which of the following is MOST important to maintain integration among the incident response plan, business continuity plan (BCP). and disaster recovery plan (DRP)?
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
Which of the following is the BEST starting point for a newly hired information security manager who has been tasked with identifying and addressing network vulnerabilities?
When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?
Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?
To inform a risk treatment decision, which of the following should the information security manager compare with the organization's risk appetite?
Which of the following is the MOST important reason to conduct interviews as part of the business impact analysis (BIA) process?
Which of the following BEST indicates the organizational benefit of an information security solution?
Which of the following is the FIRST step to establishing an effective information security program?
During which of the following development phases is it MOST challenging to implement security controls?
Which of the following sources is MOST useful when planning a business-aligned information security program?
An information security manager has confirmed the organization's cloud provider has unintentionally published some of the organization's business data. Which of the following should be done NEXT?
Which of the following presents the GREATEST risk associated with the use of an automated security information and event management (SIEM) system?
Which of the following should have the MOST influence on an organization's response to a new industry regulation?
When developing an asset classification program, which of the following steps should be completed FIRST?
Which of the following should be given the HIGHEST priority during an information security post-incident review?
Which of the following presents the GREATEST challenge to the recovery of critical systems and data following a ransomware incident?
Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?
An organization plans to offer clients a new service that is subject to regulations. What should the organization do FIRST when developing a security strategy in support of this new service?
A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?
While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?
Which risk is introduced when using only sanitized data for the testing of applications?
To improve the efficiency of the development of a new software application, security requirements should be defined:
Which of the following should be the FIRST consideration when developing a strategy for protecting an organization's data?
A business continuity plan (BCP) should contain:
Which of the following is MOST appropriate to communicate to senior management regarding information risk?
Which of the following provides the BEST assurance that security policies are applied across business operations?
Which of the following will BEST enable an organization to meet incident response requirements when outsourcing its incident response function?
Which of the following BEST enables the assignment of risk and control ownership?
The PRIMARY advantage of performing black-box control tests as opposed to white-box control tests is that they:
To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:
A recent audit found that an organization's new user accounts are not set up uniformly. Which of the following is MOST important for the information security manager to review?
Which of the following is an example of risk mitigation?
Which of the following has the GREATEST influence on the successful integration of information security within the business?
Which of the following is MOST effective for communicating forward-looking trends within security reporting?
An incident management team is alerted ta a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
Which of the following is the PRIMARY reason for an information security manager to periodically review existing controls?
Which of the following should be done FIRST when a SIEM flags a potential event?
Which of the following is the BEST course of action for an information security manager to align security and business goals?
Which of the following is MOST useful to an information security manager when determining the need to escalate an incident to senior?
Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?
During which phase of an incident response plan is the root cause determined?
An information security manager has been asked to provide both one-year and five-year plans for the information security program. What is the PRIMARY purpose for the long-term plan?
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
Which of the following is the MOST important factor in an organization's selection of a key risk indicator (KRI)?
Which of the following documents should contain the INITIAL prioritization of recovery of services?
Which of the following is the MOST effective way to influence organizational culture to align with security guidelines?
Which of the following is the BEST way to determine if an information security profile is aligned with business requirements?
The GREATEST challenge when attempting data recovery of a specific file during forensic analysis is when:
Which of the following is the MOST effective way to demonstrate alignment of information security strategy with business objectives?
Management would like to understand the risk associated with engaging an Infrastructure-as-a-Service (laaS) provider compared to hosting internally. Which of the following would provide the BEST method of comparing risk scenarios?
The MAIN benefit of implementing a data loss prevention (DLP) solution is to:
The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
Which of the following is the BEST indicator of a successful intrusion into an organization's systems?
Which of the following BEST enables the restoration of operations after a limited ransomware incident occurs?
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its cloud services.
Which of the following should be the PRIMARY focus of Company A's information security manager?
Which of the following BEST minimizes information security risk in deploying applications to the production environment?
Which of the following should be the KEY consideration when creating an information security communication plan with industry peers?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
Which of the following is MOST important for the information security manager to include when presenting changes in the security risk profile to senior management?
The PRIMARY benefit of integrating information security activities into change management processes is to:
An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?
An organization has been penalized by regulatory authorities for failing to notify them of a major security breach that may have compromised customer data. Which of the following is MOST likely in need of review and updating to prevent similar penalties in the future?
Application data integrity risk is MOST directly addressed by a design that includes:
In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
Which of the following is MOST critical when creating an incident response plan?
Which of the following is the MOST important characteristic of an effective information security metric?
Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?
Which of the following has the GREATEST impact on efforts to improve an organization's security posture?
Which of the following provides the BEST indication of the return on information security investment?
Which type of control is an incident response team?
What is the MOST important consideration for an organization operating in a highly regulated market when new regulatory requirements with high impact to the business need to be implemented?
Senior management has expressed concern that the organization's intrusion prevention system (IPS) may repeatedly disrupt business operations Which of the following BEST indicates that the information security manager has tuned the system to address this concern?
An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?
An information security manager has been tasked with developing materials to update the board, regulatory agencies, and the media about a security incident. Which of the following should the information security manager do FIRST?
Which of the following should be an information security manager's PRIMARY concern when an organization is expanding business to a new country?
An incident response plan is being developed for servers hosting sensitive information. In the event of a breach, who should make the decision to shut down the system?
An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?
Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
An organization recently updated and published its information security policy and standards. What should the information security manager do NEXT?
Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?
Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
Which of the following is the MOST effective way to determine the alignment of an information security program with the business strategy?
An organization permits the storage and use of its critical and sensitive information on employee-owned smartphones. Which of the following is the BEST security control?
Which of the following is the PRIMARY reason to review the firewall logs when an external network-based attack is reported by the intrusion detection system (IDS)?
An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?
While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?
A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?
Which of the following would BEST ensure that security is integrated during application development?
The MOST important element in achieving executive commitment to an information security governance program is:
A newly appointed information security manager of a retailer with multiple stores discovers an HVAC (heating, ventilation, and air conditioning) vendor has remote access to the stores to enable real-time monitoring and equipment diagnostics. Which of the following should be the information security manager's FIRST course of action?
What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?
The BEST way to report to the board on the effectiveness of the information security program is to present:
Which of the following BEST enables an organization to identify and contain security incidents?
An organization plans to leverage popular social network platforms to promote its products and services. Which of the following is the BEST course of action for the information security manager to support this initiative?
A business impact analysis (BIA) BEST enables an organization to establish:
Which of the following is the MOST important consideration when defining a recovery strategy in a business continuity plan (BCP)?
Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?
Which of the following would provide the MOST value to senior management when presenting the results of a risk assessment?
Capacity planning would prevent:
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
An incident response team has established that an application has been breached. Which of the following should be done NEXT?
Which of the following BEST enables an organization to effectively manage emerging cyber risk?
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?
Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:
Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?
Which of the following is the BEST way to ensure the capability to restore clean data after a ransomware attack?
The effectiveness of an information security governance framework will BEST be enhanced if:
Who has the PRIMARY authority to decide if additional risk treatments are required to mitigate an identified risk?
An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:
Which of the following is the MOST important function of an information security steering committee?
Of the following, who is accountable for data loss in the event of an information security incident at a third-party provider?
Which of the following is MOST important to the successful implementation of an information security program?
Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?
Which of the following is the PRIMARY reason to regularly update business continuity and disaster recovery documents?
Which of the following is MOST important to ensure the alignment of an information security program with the organizational strategy?
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?
When assigning a risk owner, the MOST important consideration is to ensure the owner has:
Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?
Which of the following factors would have the MOST significant impact on an organization's information security governance mode?
Which of the following is the BEST way lo monitor for advanced persistent threats (APT) in an organization?
Which of the following would BEST guide the development and maintenance of an information security program?
Relationships between critical systems are BEST understood by
The information security manager of a multinational organization has been asked to consolidate the information security policies of its regional locations. Which of the following would be of
GREATEST concern?
Which of the following business units should own the data that populates an identity management system?
Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?
The use of a business case to obtain funding for an information security investment is MOST effective when the business case:
The executive management of a domestic organization has announced plans to expand operations to multiple international locations. Which of the following should be the information security manager's FIRST step upon learning of these plans?
Which of the following BEST facilitates the effective execution of an incident response plan?
Which of the following presents the GREATEST challenge to a security operations center's wna GY of potential security breaches?
The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:
A business continuity plan (BCP) should contain:
Who is accountable for approving an information security governance framework?
Which of the following is a PRIMARY responsibility of the information security goxernance function?
Which of the following should be the PRIMARY objective when establishing a new information security program?
An organization's research department plans to apply machine learning algorithms on a large data set containing customer names and purchase history. The risk of personal data leakage is considered high impact. Which of the following is the BEST risk treatment option in this situation?
From a business perspective, the GREATEST benefit of an incident response plan is that it:
The MOST important information for influencing management’s support of information security is:
Which of the following BEST helps to ensure the effective execution of an organization's disaster recovery plan (DRP)?
Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?
Which of the following is the GREATEST value provided by a security information and event management (SIEM) system?
Of the following, who is BEST suited to own the risk discovered in an application?
An organization's quality process can BEST support security management by providing:
The PRIMARY advantage of involving end users in continuity planning is that they:
What should be an information security manager's FIRST step when developing a business case for a new intrusion detection system (IDS) solution?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
Which of the following is the BEST way to determine the effectiveness of an incident response plan?
Which of the following BEST helps to enable the desired information security culture within an organization?
When collecting admissible evidence, which of the following is the MOST important requirement?
Which of the following BEST enables an organization to maintain legally admissible evidence7
Which of the following is MOST important when responding to a major security incident?
An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:
Which of the following is MOST important when developing an information security strategy?
Which of the following is BEST used to determine the maturity of an information security program?
Which of the following is the BEST indication of an effective information security awareness training program?
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
Which of the following is the BEST indicator of the maturity level of a vendor risk management process?
After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?
The PRIMARY objective of a post-incident review of an information security incident is to:
An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?
A technical vulnerability assessment on a personnel information management server should be performed when:
What should an information security manager verify FIRST when reviewing an information asset management program?
Which of the following has the MOST influence on the inherent risk of an information asset?
Who should be responsible for determining the level of data classification required for an application related to a new line of business?
After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?
If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:
Which of the following is the MOST important reason to involve external forensics experts in evidence collection when responding to a major security breach?
Which of the following should be done FIRST when establishing an information security governance framework?
Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
Which of the following metrics is MOST appropriate for evaluating the incident notification process?
An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?
Which of the following should be the MOST important consideration of business continuity management?
Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?
A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?
ACISO learns that a third-party service provider did not notify the organization of a data breach that affected the service provider's data center. Which of the following should the CISO do FIRST?
Which of the following should be the PRIMARY area of focus when mitigating security risks associated with emerging technologies?
Which of the following BEST determines the data retention strategy and subsequent policy for an organization?
Which of the following BEST facilitates the effectiveness of cybersecurity incident response?
Which of the following should be the PRIMARY basis for determining the value of assets?
Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?
Which of the following is the PRIMARY objective of a cyber resilience strategy?
Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?
Which of the following is the BEST approach to make strategic information security decisions?
Which of the following is MOST relevant for an information security manager to communicate to the board of directors?
After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:
An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?
To ensure that a new application complies with information security policy, the BEST approach is to:
Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?
An organization experienced a loss of revenue during a recent disaster. Which of the following would BEST prepare the organization to recover?
Once a suite of security controls has been successfully implemented for an organization's business units, it is MOST important for the information security manager to:
Which of the following BEST indicates misalignment of security policies with business objectives?
Which of the following is MOST helpful for determining which information security policies should be implemented by an organization?
Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?
An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?
Which of the following activities is designed to handle a control failure that leads to a breach?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
What is the BEST way to reduce the impact of a successful ransomware attack?
An organization has updated its business goals in the middle of the fiscal year to respond to changes in market conditions. Which of the following is MOST important for the information security manager to update in support of the new goals?
Which of the following MUST happen immediately following the identification of a malware incident?
A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?
A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?
Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?
How does an incident response team BEST leverage the results of a business impact analysis (BIA)?
Which of the following should an information security manager do FIRST after identifying suspicious activity on a PC that is not in the organization's IT asset inventory?
Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?
In which cloud model does the cloud service buyer assume the MOST security responsibility?
Which of the following is the PRIMARY advantage of an organization using Disaster Recovery as a Service (DRaaS) to help manage its disaster recovery program?
To help ensure that an information security training program is MOST effective, its contents should be:
Which of the following BEST supports investments in an information security program?
An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?
Which of the following is the BEST indication of effective information security governance?
Which of the following is MOST important to include in security incident escalation procedures?
Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?
A project team member notifies the information security manager of a potential security risk that has not been included in the risk register. Which of the following should the information security manager do FIRST?
A KEY consideration in the use of quantitative risk analysis is that it:
Which of the following is the MOST essential element of an information security program?
When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?
Which of the following is the PRIMARY responsibility of an information security governance committee?
Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?
Which of the following is MOST important to include in monthly information security reports to the board?
Which of the following is a PRIMARY benefit of managed security solutions?
Recommendations for enterprise investment in security technology should be PRIMARILY based on:
When determining an acceptable risk level which of the following is the MOST important consideration?
Which of the following MUST be established to maintain an effective information security governance framework?
When analyzing the emerging risk and threat landscape, an information security manager should FIRST:
A new application has entered the production environment with deficient technical security controls. Which of the following is MOST Likely the root cause?
What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?
Of the following, who would provide the MOST relevant input when aligning the information security strategy with organizational goals?
What will BEST facilitate the success of new security initiatives?
An organization has purchased an Internet sales company to extend the sales department. The information security manager's FIRST step to ensure the security policy framework encompasses the new business model is to:
Which of the following should an information security manager do FIRST after a new cybersecunty regulation has been introduced?
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
When developing an information security strategy for an organization, which of the following is MOST helpful for understanding where to focus efforts?
Which of the following should include contact information for representatives of equipment and software vendors?
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
Which of the following should be done FIRST once a cybersecurity attack has been confirmed?
Information security controls should be designed PRIMARILY based on:
Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?
Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?
Which of the following is the BEST reason to implement an information security architecture?
An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification for granting an exception to the policy?
Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?
Which of the following should be implemented to BEST reduce the likelihood of a security breach?
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
Which of the following is the BEST approach for data owners to use when defining access privileges for users?
Define access privileges based on user roles.
Adopt user account settings recommended by the vendor.
Perform a risk assessment of the users' access privileges.
Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?
A data loss prevention (DLP) tool has flagged personally identifiable information (Pll) during transmission. Which of the following should the information security manager do FIRST?
Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
Which of the following is the MOST important detail to capture in an organization's risk register?