An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?
Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?
An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?
In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.
Before relying on this certification, it is MOST important that the information security manager confirms that the:
Which of the following is MOST important to include in a post-incident review following a data breach?
An organization has acquired a company in a foreign country to gain an advantage in a new market. Which of the following is the FIRST step the information security manager should take?
Which of the following is MOST important when conducting a forensic investigation?
An information security manager developing an incident response plan MUST ensure it includes:
A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?
The BEST way to identify the risk associated with a social engineering attack is to:
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?