Which of the following metrics is MOST appropriate for evaluating the incident notification process?
Prior to conducting a forensic examination, an information security manager should:
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
Which of the following is the MOST important reason for logging firewall activity?
Which of the following is the BEST way to address data availability concerns when outsourcing information security administration?
Which is MOST important to identify when developing an effective information security strategy?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
Which of the following is MOST important to ensure incident management readiness?
Which of the following is the BEST justification for making a revision to a password policy?
Which of the following should an information security manager do FIRST after identifying suspicious activity on a PC that is not in the organization's IT asset inventory?
Which of the following metrics would provide an accurate measure of an information security program's performance?
An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?
Which of the following is the BEST course of action for an information security manager to align security and business goals?
Which of the following would be MOST helpful to identify worst-case disruption scenarios?
Which of the following would BEST enable the timely execution of an incident response plan?
Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
An organization uses a security standard that has undergone a major revision by the certifying authority. The old version of the standard will no longer be used for organizations wishing to maintain their certifications. Which of the following should be the FIRST
course of action?
In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?
Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?
What is the PRIMARY benefit to an organization that maintains an information security governance framework?
Which of the following should be an information security manager's PRIMARY concern when an organization is expanding business to a new country?
Which of the following is the MOST critical consideration when shifting IT operations to an Infrastructure as a Service (laaS) model hosted in a foreign country?
An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
An organization would like to invest in a new emerging technology. Which of the following is MOST important for the information security manager to consider when evaluating its impact?
Which of the following is the PRIMARY preventive method to mitigate risks associated with privileged accounts?
Which of the following is the MOST important consideration when establishing an organization's information security governance committee?
Which of the following is MOST useful to an information security manager when determining the need to escalate an incident to senior?
Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?
Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?
Which of the following presents the GREATEST challenge to the recovery of critical systems and data following a ransomware incident?
Which of the following provides the BEST evidence that a recently established infofmation security program is effective?
Which of the following is MOST important to include in an incident response plan to ensure incidents are responded to by the appropriate individuals?
Which of the following BEST indicates that information security governance and corporate governance are integrated?
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?
Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?
A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be in the business continuity plan (BCP) to manage this requirement?
Which of the following is an information security manager's MOST important course of action after receiving information about a new cybersecurity threat?
Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?
A department has reported that a security control is no longer effective. Which of the following is the information security manager's BEST course of action?
A security incident has been reported within an organization When should an information security manager contact the information owner?
Implementing the principle of least privilege PRIMARILY requires the identification of:
To effectively manage an organization's information security risk, it is MOST important to:
A security incident has been reported within an organization. When should an information security manager contact the information owner?
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
The PRIMARY purpose for continuous monitoring of security controls is to ensure:
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
An organization's quality process can BEST support security management by providing:
After a ransomware incident an organization's systems were restored. Which of the following should be of MOST concern to the information security manager?
An organization needs to comply with new security incident response requirements. Which of the following should the information security manager do FIRST?
Which of the following is MOST important for the improvement of a business continuity plan (BCP)?
An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?
Which of the following BEST demonstrates that an anti-phishing campaign is effective?
Which of the following is the PRIMARY reason to perform regular reviews of the cybersecurity threat landscape?
Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:
Which of the following is MOST important when developing an information security strategy?
Which of the following change management procedures is MOST likely to cause concern to the information security manager?
Which of the following has the MOST influence on the inherent risk of an information asset?
Which of the following BEST prepares a computer incident response team for a variety of information security scenarios?
Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?
In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?
When is the BEST time to verify that a production system's security mechanisms meet control objectives?
Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?
Which of the following BEST indicates misalignment of security policies with business objectives?
Which of the following is the MOST important detail to capture in an organization's risk register?
Which of the following is the BEST way to obtain organization-wide support for an information security program?
Which of the following will BEST enable an effective information asset classification process?
Which of the following BEST determines the data retention strategy and subsequent policy for an organization?
Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
Which of the following BEST indicates the organizational benefit of an information security solution?
An organization is in the process of defining policies for employee use of social media. It is MOST important for the information security manager to:
Which is the BEST method to evaluate the effectiveness of an alternate processing site when continuous uptime is required?
Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?
Which of the following roles is BEST suited to validate user access requirements during an annual user access review?
When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?
Which of the following roles is BEST able to influence the security culture within an organization?
Which of the following is MOST important to have in place as a basis for developing an effective information security program that supports the organization's business goals?
When taking a risk-based approach to vulnerability management, which of the following is MOST important to consider when prioritizing a vulnerability?
An information security manager has confirmed the organization's cloud provider has unintentionally published some of the organization's business data. Which of the following should be done NEXT?
A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:
Which of the following should have the MOST influence on the development of information security policies?
Which of the following functions is MOST critical when initiating the removal of system access for terminated employees?
What type of control is being implemented when a security information and event management (SIEM) system is installed?
Which of the following is the MOST effective way to detect security incidents?
Meeting which of the following security objectives BEST ensures that information is protected against unauthorized disclosure?
Which of the following is MOST important to maintain integration among the incident response plan, business continuity plan (BCP). and disaster recovery plan (DRP)?
When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?
When developing a categorization method for security incidents, the categories MUST:
Which of the following is the PRIMARY role of an information security manager in a software development project?
Which of the following is MOST helpful in determining whether a phishing email is malicious?
A global organization has outsourced security processes to a service provider by means of a global agreement. What is the MOST efficient approach to meet country-specific regulatory requirements?
Which of the following is the GREATEST benefit of information asset classification?
Which of the following would provide the BEST evidence to senior management that security control performance has improved?
Which of the following would provide the MOST effective security outcome in an organizations contract management process?
Recommendations for enterprise investment in security technology should be PRIMARILY based on:
Which of the following is the MOST effective way to determine the alignment of an information security program with the business strategy?
Which of the following should be an information security manager s MOST important consideration when determining the priority for implementing security controls?
Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?
When updating the information security policy to accommodate a new regulation, the information security manager should FIRST:
Which of the following is MOST important to include in an information security strategy?
If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:
Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?
Which of the following incident response phases involves actions to help safeguard critical systems while maintaining business operations?
The PRIMARY benefit of introducing a single point of administration in network monitoring is that it:
Which of the following messages would be MOST effective in obtaining senior management's commitment to information security management?
Which is following should be an information security manager's PRIMARY focus during the development of a critical system storing highly confidential data?
An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?
Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?
An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?
After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:
An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?
Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?
From an information security perspective, legal issues associated with a transborder flow of technology-related items are MOST often
Which of the following is the BEST strategy when determining an organization's approach to risk treatment?
Which of the following will BEST facilitate the integration of information security governance into enterprise governance?
A new type of ransomware has infected an organization's network. Which of the following would have BEST enabled the organization to detect this situation?
Which risk is introduced when using only sanitized data for the testing of applications?
Which of the following is MOST critical when creating an incident response plan?
Which of the following is the MOST effective way to influence organizational culture to align with security guidelines?
Which of the following is MOST effective for communicating forward-looking trends within security reporting?
In addition to executive sponsorship and business alignment, which of the following is MOST critical for information security governance?
Which of the following BEST minimizes information security risk in deploying applications to the production environment?
An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?
When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?
When developing an asset classification program, which of the following steps should be completed FIRST?
An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?
Of the following, who is MOST appropriate to own the risk associated with the failure of a privileged access control?
An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager's FIRST step?
The GREATEST challenge when attempting data recovery of a specific file during forensic analysis is when:
Communicating which of the following would be MOST helpful to gain senior management support for risk treatment options?
An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:
Once a suite of security controls has been successfully implemented for an organization's business units, it is MOST important for the information security manager to:
Who has the PRIMARY authority to decide if additional risk treatments are required to mitigate an identified risk?
Which of the following is the BEST way lo monitor for advanced persistent threats (APT) in an organization?
When determining an acceptable risk level which of the following is the MOST important consideration?
Identifying which of the following BEST enables a cyberattack to be contained?
Which of the following provides the BEST input to determine the level of protection needed for an IT system?
Which of the following is the MOST effective way to identify changes in an information security environment?
When integrating security risk management into an organization it is MOST important to ensure:
A data loss prevention (DLP) tool has flagged personally identifiable information (Pll) during transmission. Which of the following should the information security manager do FIRST?
An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?
Which of the following should be triggered FIRST when unknown malware has infected an organization's critical system?
Which of the following is MOST important for an information security manager to consider when identifying information security resource requirements?
What is the role of the information security manager in finalizing contract negotiations with service providers?
Which of the following is MOST important to include in an information security status report to senior management?
Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?
Which of the following is the MOST important factor in an organization's selection of a key risk indicator (KRI)?
Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?
Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?
Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?
Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
Which type of policy BEST helps to ensure that all employees, contractors, and third-party users receive formal communication regarding an organization’s security program?
Which of the following should be considered FIRST when recovering a compromised system that needs a complete rebuild?
An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?
Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?
When assigning a risk owner, the MOST important consideration is to ensure the owner has:
Which of the following events is MOST likely to require an organization to revisit its information security framework?
Which of the following is MOST relevant for an information security manager to communicate to the board of directors?
Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of
confidentiality?
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
Which of the following should be the PRIMARY outcome of an information security program?
Senior management wants to thoroughly test a disaster recovery plan (DRP) for a mission-critical system. Which of the following would provide the MOST reliable results?
Which of the following MUST be established to maintain an effective information security governance framework?
What is the MOST important consideration when establishing metrics for reporting to the information security strategy committee?
Which of the following provides the MOST effective response against ransomware attacks?
How does an organization PRIMARILY benefit from the creation of an information security steering committee?
Which of the following MUST happen immediately following the identification of a malware incident?
Which of the following is the PRIMARY reason for an information security manager to periodically review existing controls?
An organization has purchased an Internet sales company to extend the sales department. The information security manager's FIRST step to ensure the security policy framework encompasses the new business model is to:
Which of the following has the MOST influence on the information security investment process?
Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?
While responding to a high-profile security incident, an information security manager observed several deficiencies in the current incident response plan. When would be the BEST time to update the plan?
Which of the following BEST enables the assignment of risk and control ownership?
Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?
What should an information security manager verify FIRST when reviewing an information asset management program?
Which of the following is the MOST important reason to consider organizational culture when developing an information security program?
Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?
Which of the following should an information security manager do FIRST upon learning that a competitor has experienced a ransomware attack?
Which of the following should be the NEXT step after a security incident has been reported?
Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?
The BEST way to identify the risk associated with a social engineering attack is to:
An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?
Which of the following is the MOST effective way to prevent information security incidents?
An organization has identified a weakness in the ability of its employees to identify and report cybersecurity incidents. Although training materials have been provided, employees show a lack of interest. Which of the following is the information security manager’s BEST course of action?
Which of the following should be established FIRST when implementing an information security governance framework?
Several months after the installation of a new firewall with intrusion prevention features to block malicious activity, a breach was discovered that came in through the firewall shortly after installation. This breach could have been detected earlier by implementing firewall:
Which of the following is the PRIMARY purpose of a business impact analysis (BIA)?
Which of the following is the BEST option to lower the cost to implement application security controls?
Which of the following should be the FIRST consideration when developing a strategy for protecting an organization's data?
Which of the following roles has the PRIMARY responsibility to ensure the operating effectiveness of IT controls?
Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?
The PRIMARY reason for creating a business case when proposing an information security project is to:
An organization learns that a third party has outsourced critical functions to another external provider. Which of the following is the information security manager's MOST important course of action?
Which of the following provides the BEST assurance that security policies are applied across business operations?
Which of the following BEST supports investments in an information security program?
Which of the following is MOST important in order to obtain senior leadership support when presenting an information security strategy?
Which of the following is MOST important when responding to a major security incident?
Which of the following BEST facilitates the effectiveness of cybersecurity incident response?
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?
Which of the following is the PRIMARY objective of a cyber resilience strategy?
While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?
Which of the following is the MOST important reason for obtaining input from risk owners when implementing controls?
Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?
Which of the following is the BEST course of action when an information security manager identifies that systems are vulnerable to emerging threats?
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?
Threat and vulnerability assessments are important PRIMARILY because they are:
Which of the following tasks should be performed once a disaster recovery plan (DRP) has been developed?
An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?
Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?
Which of the following is the PRIMARY reason to regularly update business continuity and disaster recovery documents?
Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?
Which of the following is the PRIMARY responsibility of the information security function when an organization adopts emerging technologies?
Which of the following is MOST important for the information security manager to include when presenting changes in the security risk profile to senior management?
When management changes the enterprise business strategy which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?
An organization is planning to outsource network management to a service provider. Including which of the following in the contract would be the MOST effective way to mitigate information security risk?
An information security manager is alerted to multiple security incidents across different business units, with unauthorized access to sensitive data and potential data exfiltration from critical systems. Which of the following is the BEST course of action to appropriately classify and prioritize these incidents?
Which of the following is BEST used to determine the maturity of an information security program?
Which of the following should an information security manager do FIRST when a mandatory security standard hinders the achievement of an identified business objective?
Network isolation techniques are immediately implemented after a security breach to:
Which of the following has the GREATEST impact on the effectiveness of an organization’s security posture?
An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?
If the investigation of an incident is not completed within the time allocated in the incident response plan, which of the following actions should be taken by the incident response team?
When establishing metrics for an information security program, the BEST approach is to identify indicators that:
Which of the following should have the MOST influence on an organization's response to a new industry regulation?
Which of the following is the PRIMARY objective of information asset classification?
Which of the following will BEST facilitate integrating the information security program into corporate governance?
An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:
A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?
When deciding to move to a cloud-based model, the FIRST consideration should be:
Which of the following is the MOST important outcome of a post-incident review?
Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?
When implementing a security policy for an organization handling personally identifiable information (Pll); the MOST important objective should be:
Which of the following should be the PRIMARY focus for an information security manager when reviewing access controls for data stored in an off-premise cloud environment?
Which of the following is the BEST indication of information security strategy alignment with the “&
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
In an organization with a rapidly changing environment, business management has accepted an information security risk. It is MOST important for the information security manager to ensure:
What is the PRIMARY benefit to an organization when information security program requirements are aligned with employment and staffing processes?
Which of the following BEST enables the integration of information security governance into corporate governance?