Which of the following would be of GREATEST assistance in determining whether to accept residual risk of a critical security system?
Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?
The PRIMARY purpose for continuous monitoring of security controls is to ensure:
An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?
Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager's FIRST step in addressing the issue should be to:
Which of the following BEST indicates the effectiveness of the vendor risk management process?
Which of the following is the BEST indicator of an organization's information security status?
An incident management team is alerted ta a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?
What should be the FIRST step when an Internet of Things (loT) device in an organization's network is confirmed to have been hacked?
An organization is increasingly using Software as a Service (SaaS) to replace in-house hosting and support of IT applications. Which of the following would be the MOST effective way to help ensure procurement decisions consider information security concerns?
Which of the following is the BEST indication of an effective information security awareness training program?
Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?