Which of the following is the PRIMARY role of an information security manager in a software development project?
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?
Which of the following BEST enables staff acceptance of information security policies?
Which of the following will have the GREATEST influence on the successful adoption of an information security governance program?
Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?
Which of the following activities MUST be performed by an information security manager for change requests?
When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?
Which of the following should be the PRIMARY consideration when developing an incident response plan?
Which of the following would BEST ensure that security is integrated during application development?
Management decisions concerning information security investments will be MOST effective when they are based on:
Which of the following parties should be responsible for determining access levels to an application that processes client information?
Which of the following BEST indicates that information security governance and corporate governance are integrated?