When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
Which of the following BEST helps to enable the desired information security culture within an organization?
What is the role of the information security manager in finalizing contract negotiations with service providers?
Which of the following is the MOST important characteristic of an effective information security metric?
Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?
Which of the following is the BEST method for determining whether new risks exist in legacy systems?
Which of the following processes BEST supports the evaluation of incident response effectiveness?
Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?
An organization is MOST likely to accept the risk of noncompliance with a new regulatory requirement when:
Which of the following has the GREATEST influence on an organization's information security strategy?
An organization recently outsourced the development of a mission-critical business application. Which of the following would be the BEST way to test for the existence of backdoors?
The information security manager of a multinational organization has been asked to consolidate the information security policies of its regional locations. Which of the following would be of
GREATEST concern?
Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?
Which of the following is MOST important when developing an information security strategy?
An information security team is investigating an alleged breach of an organization's network. Which of the following would be the BEST single source of evidence to review?
Which of the following is MOST important for an information security manager to verify when selecting a third-party forensics provider?
The MOST effective tools for responding to new and advanced attacks are those that detect attacks based on:
Which of the following should be the KEY consideration when creating an information security communication plan with industry peers?
An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?
Which of the following is the PRIMARY role of an information security manager in a software development project?
A new application has entered the production environment with deficient technical security controls. Which of the following is MOST Likely the root cause?
Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?
An information security manager has confirmed the organization's cloud provider has unintentionally published some of the organization's business data. Which of the following should be done NEXT?
Which of the following is the GREATEST benefit of using AI tools in security operations?
To ensure that a new application complies with information security policy, the BEST approach is to:
An organization plans to leverage popular social network platforms to promote its products and services. Which of the following is the BEST course of action for the information security manager to support this initiative?
Which of the following is the GREATEST benefit of information asset classification?
Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?
An organization permits the storage and use of its critical and sensitive information on employee-owned smartphones. Which of the following is the BEST security control?
Which of the following is MOST helpful for determining which information security policies should be implemented by an organization?
For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?
Which of the following messages would be MOST effective in obtaining senior management's commitment to information security management?
Which of the following should an information security manager do FIRST when a vulnerability has been disclosed?
Which of the following desired outcomes BEST supports a decision to invest in a new security initiative?
Which of the following is the BEST method for determining whether a firewall has been configured to provide a comprehensive perimeter defense9
The PRIMARY reason for creating a business case when proposing an information security project is to:
Which of the following is MOST important for guiding the development and management of a comprehensive information security program?
Which of the following BEST supports the incident management process for attacks on an organization's supply chain?
Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?
An organization is experiencing a sharp increase in incidents related to phishing messages. The root cause is an outdated email filtering system that is no longer supported by the vendor. Which of the following should be the information security manager's FIRST course of action?
What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?
An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
Security administration efforts will be greatly reduced following the deployment of which of the following techniques?
An organization has suffered from a large-scale security event impacting a critical system. Following the decision to restore the system at an alternate location, which plan should be invoked?
An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
How does an incident response team BEST leverage the results of a business impact analysis (BIA)?
Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?
A financial institution is planning to develop a new mobile application. Which of the following is the BEST time to begin assessments of the application's security compliance?
An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?
After the occurrence of a major information security incident, which of the following will BEST help an information security manager determine corrective actions?
An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
How does an organization PRIMARILY benefit from the creation of an information security steering committee?
When developing an asset classification program, which of the following steps should be completed FIRST?
Which of the following BEST demonstrates that an anti-phishing campaign is effective?
An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager's FIRST step?
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?
The BEST way to report to the board on the effectiveness of the information security program is to present:
Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?
A common drawback of email software packages that provide native encryption of messages is that the encryption:
Which of the following is the MOST critical input to developing policies, standards, and procedures to secure information assets?
Which of the following is MOST appropriate for an organization to consider when defining incident classification and categorization levels?
Which of the following tools would be MOST helpful to an incident response team?
Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?
Which of the following is MOST effective for communicating forward-looking trends within security reporting?
In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.
Before relying on this certification, it is MOST important that the information security manager confirms that the:
An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?
Which of the following is the BEST technical defense against unauthorized access to a corporate network through social engineering?
Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
The BEST way to identify the risk associated with a social engineering attack is to:
The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness training program is to include:
Which of the following is MOST likely to reduce the effectiveness of a SIEM system?
In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?
An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?
Which of the following should an information security manager do FIRST when developing an organization's disaster recovery plan (DRP)?
The executive management of a domestic organization has announced plans to expand operations to multiple international locations. Which of the following should be the information security manager's FIRST step upon learning of these plans?
Which of the following roles is MOST appropriate to determine access rights for specific users of an application?
Which of the following will ensure confidentiality of content when accessing an email system over the Internet?
Senior management has expressed concern that the organization's intrusion prevention system (IPS) may repeatedly disrupt business operations Which of the following BEST indicates that the information security manager has tuned the system to address this concern?
What should a global information security manager do FIRST when informed that a new regulation with significant impact will go into effect soon?
Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be in the business continuity plan (BCP) to manage this requirement?
Management would like to understand the risk associated with engaging an Infrastructure-as-a-Service (laaS) provider compared to hosting internally. Which of the following would provide the BEST method of comparing risk scenarios?
Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?
Which of the following would provide the MOST effective security outcome in an organizations contract management process?
Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?
Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?
An organization is considering using a third party to host sensitive archived data. Which of the following is MOST important to verify before entering into the relationship?
Which of the following should be the FIRST step in developing an information security strategy?
A finance department director has decided to outsource the organization's budget application and has identified potential providers. Which of the following actions should be initiated FIRST by IN information security manager?
Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?
Which of the following would be the BEST way to reduce the risk of disruption resulting from an emergency system change?
Before approving the implementation of a new security solution, senior management requires a business case. Which of the following would BEST support the justification for investment?
When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?
Which of the following is the GREATEST value provided by a security information and event management (SIEM) system?
Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?
An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?
The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:
Which of the following is the MOST important criterion when deciding whether to accept residual risk?
In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?
An employee who is a remote user has copied financial data from the corporate server to a laptop using virtual private network (VPN) connectivity. Which of the following is the MOST important factor to determine if it should be classified as a data leakage incident?
An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
A new regulatory requirement affecting an organization's information security program is released. Which of the following should be the information security manager's FIRST course of action?
Which of the following is the PRIMARY preventive method to mitigate risks associated with privileged accounts?
An information security program is BEST positioned for success when it is closely aligned with:
Which of the following BEST indicates that information assets are classified accurately?
An organization has just updated its backup capability to a new cloud-based solution. Which of the following tests will MOST effectively verify this change is working as intended?
Which of the following BEST enables the integration of information security governance into corporate governance?
Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?
Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
An organization is planning to outsource the execution of its disaster recovery activities. Which of the following would be MOST important to include in the outsourcing agreement?
Which of the following defines the triggers within a business continuity plan (BCP)? @
Which of the following is MOST important for the successful implementation of an incident response plan?
Which of the following is the MOST effective way to increase security awareness in an organization?
When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?
Business objectives and organizational risk appetite are MOST useful inputs to the development of information security:
An organization plans to implement a new e-commerce operation in a highly regulated market. Which of the following is MOST important to consider when updating the risk management strategy?
Which of the following is MOST critical when creating an incident response plan?
Which of the following will BEST facilitate timely and effective incident response?
When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?
Which of the following is MOST likely to reduce the effectiveness of a SIEM system?
Which of the following is the BEST way to address data availability concerns when outsourcing information security administration?
When is the BEST time to verify that a production system's security mechanisms meet control objectives?
An information security team has started work to mitigate findings from a recent penetration test. Which of the following presents the GREATEST risk to the organization?
Which of the following BEST facilitates the effectiveness of cybersecurity incident response?
What is the MOST important consideration for an organization operating in a highly regulated market when new regulatory requirements with high impact to the business need to be implemented?
Which of the following events is MOST likely to require an organization to revisit its information security framework?
The MOST useful technique for maintaining management support for the information security program is:
Which of the following is MOST important for the improvement of a business continuity plan (BCP)?
Which of the following is a PRIMARY responsibility of the information security goxernance function?
Which of the following provides the MOST effective response against ransomware attacks?
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
Once a suite of security controls has been successfully implemented for an organization's business units, it is MOST important for the information security manager to:
Which of the following is the MOST critical factor for information security program success?
Which of the following would BEST ensure that security risk assessment is integrated into the life cycle of major IT projects?
Management decisions concerning information security investments will be MOST effective when they are based on:
Which of the following should be updated FIRST to account for new regulatory requirements that impact current information security controls?
When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:
Which of the following is the BEST reason for senior management to support a business case for developing a monitoring system for a critical application?
Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?
Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:
Which of the following is the MOST appropriate risk response when the risk impact has been determined to be immaterial and the likelihood is very low?
Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?
Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?
An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification for granting an exception to the policy?
An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:
An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?
Which of the following should be established FIRST when implementing an information security governance framework?
Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?
Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?
Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?
When developing a business case to justify an information security investment, which of the following would BEST enable an informed decision by senior management?
A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?
When collecting admissible evidence, which of the following is the MOST important requirement?
Which of the following is the BEST way to ensure data is not co-mingled or exposed when using a cloud service provider?
Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?
Which risk is introduced when using only sanitized data for the testing of applications?
A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager's FIRST step in addressing the issue should be to:
Which of the following is the MOST important outcome of a post-incident review?
In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?
Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?
Management has announced the acquisition of a new company. The information security manager of the parent company is concerned that conflicting access rights may cause critical information to be exposed during the integration of the two companies. To BEST address this concern, the information security manager should:
Which of the following would provide the MOST value to senior management when presenting the results of a risk assessment?
From an information security perspective, legal issues associated with a transborder flow of technology-related items are MOST often
An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?
An information security manager is alerted to multiple security incidents across different business units, with unauthorized access to sensitive data and potential data exfiltration from critical systems. Which of the following is the BEST course of action to appropriately classify and prioritize these incidents?
An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?
A newly appointed information security manager of a retailer with multiple stores discovers an HVAC (heating, ventilation, and air conditioning) vendor has remote access to the stores to enable real-time monitoring and equipment diagnostics. Which of the following should be the information security manager's FIRST course of action?
Which of the following metrics BEST demonstrates the effectiveness of an organization's security awareness program?
A new information security manager finds that the organization tends to use short-term solutions to address problems. Resource allocation and spending are not effectively tracked, and there is no assurance that compliance requirements are being met. What should be done FIRST to reverse this bottom-up approach to security?
Which of the following is MOST important to include in security incident escalation procedures?
To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:
Which of the following should be of GREATEST concern to an information security manager when evaluating a cloud service provider?
Which of the following BEST enables an organization to effectively manage emerging cyber risk?
Which of the following is MOST difficult to measure following an information security breach?
Which of the following is the PRIMARY reason to review the firewall logs when an external network-based attack is reported by the intrusion detection system (IDS)?
Which of the following is the BEST way lo monitor for advanced persistent threats (APT) in an organization?
When developing an information security strategy for an organization, which of the following is MOST helpful for understanding where to focus efforts?
Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?
Which of the following should be given the HIGHEST priority during an information security post-incident review?
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?
The PRIMARY goal of the eradication phase in an incident response process is to:
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:
Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?
Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?
Which of the following is the BEST way to enhance training for incident response teams?
Which or the following is MOST important to consider when determining backup frequency?
An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization's critical systems?
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be defined in the business continuity plan (BCP) to manage this requirement?
Which of the following is MOST useful to an information security manager when determining the need to escalate an incident to senior?
Which of the following is the MOST important requirement for a successful security program?
Which of the following should be the PRIMARY area of focus when mitigating security risks associated with emerging technologies?
When management changes the enterprise business strategy which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?
Which of the following BEST enables staff acceptance of information security policies?
The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
Which of the following sources is MOST useful when planning a business-aligned information security program?
During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?
Which of the following should be the FIRST step in developing an information security strategy?
The categorization of incidents is MOST important for evaluating which of the following?
Which of the following is the BEST strategy when determining an organization’s approach to risk treatment?
When choosing the best controls to mitigate risk to acceptable levels, the information security manager's decision should be MAINLY driven by:
A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?
Which of the following events would MOST likely require a revision to the information security program?
Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?
Which of the following has the MOST influence on the information security investment process?
An organization recently updated and published its information security policy and standards. What should the information security manager do NEXT?
An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?
Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
Which of the following parties should be responsible for determining access levels to an application that processes client information?
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:
Which of the following BEST enables an incident response team to determine appropriate actions during an initial investigation?
Which of the following is the PRIMARY objective of information asset classification?
When determining an acceptable risk level which of the following is the MOST important consideration?
Which of the following is the GREATEST challenge when developing key risk indicators (KRIs)?
Which of the following activities MUST be performed by an information security manager for change requests?
Which of the following is the BEST indication of an effective information security awareness training program?
What type of control is being implemented when a security information and event management (SIEM) system is installed?
An organization experienced a loss of revenue during a recent disaster. Which of the following would BEST prepare the organization to recover?
Which of the following should be the PRIMARY objective of an information security governance framework?
An organization has updated its business goals in the middle of the fiscal year to respond to changes in market conditions. Which of the following is MOST important for the information security manager to update in support of the new goals?
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
Which of the following should an information security manager do FIRST when there is a conflict between the organization's information security policy and a local regulation?
Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?
In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:
As part of incident response activities, the BEST time to begin the recovery process is after:
Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?
Which of the following has the GREATEST impact on efforts to improve an organization's security posture?
Which of the following is the MOST important role of the information security manager when the organization is in the process of adopting emerging technologies?
Which of the following BEST supports information security management in the event of organizational changes in security personnel?
Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?
Which of the following roles is BEST able to influence the security culture within an organization?
Which of the following is the MOST effective way to prevent information security incidents?
Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?
Which of the following BEST minimizes information security risk in deploying applications to the production environment?
Which of the following should be the MOST important consideration when reviewing an information security strategy?
What should an information security manager do FIRST when an organization is planning to use a third-party cloud computing service for a critical business process?
Which of the following is the MOST essential element of an information security program?
Which of the following BEST facilitates the development of a comprehensive information security policy?
Which of the following provides the BEST assurance that security policies are applied across business operations?
Which of the following presents the GREATEST challenge to a large multinational organization using an automated identity and access management (1AM) system?
When building support for an information security program, which of the following elements is MOST important?
An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:
Meeting which of the following security objectives BEST ensures that information is protected against unauthorized disclosure?
During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
Which of the following is the MOST critical consideration when shifting IT operations to an Infrastructure as a Service (laaS) model hosted in a foreign country?
Which of the following should be the PRIMARY consideration when developing an incident response plan?
Which of the following is established during the preparation phase of an incident response plan?
Which of the following would BEST guide the development and maintenance of an information security program?
Senior management has just accepted the risk of noncompliance with a new regulation What should the information security manager do NEX*P
Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?
Which of the following is MOST important to include in monthly information security reports to the board?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
Which of the following BEST protects against emerging advanced persistent threat (APT) actors?
Which of the following should be done FIRST when a SIEM flags a potential event?
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
An organization plans to offer clients a new service that is subject to regulations. What should the organization do FIRST when developing a security strategy in support of this new service?
When analyzing the emerging risk and threat landscape, an information security manager should FIRST:
Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?
Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?
Which of the following is MOST important in increasing the effectiveness of incident responders?