When managing an Information Security Program, which of the following is of MOST importance in order to influence the culture of an organization?
The exposure factor of a threat to your organization is defined by?
A stakeholder is a person or group:
When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?
Which of the following is the MOST important component of any change management process?
When managing the critical path of an IT security project, which of the following is MOST important?
The security team has investigated the theft/loss of several unencrypted laptop computers containing sensitive corporate information. To prevent the loss of any additional corporate data it is unilaterally decided by the CISO that all existing and future laptop computers will be encrypted. Soon, the help desk is flooded with complaints about the slow performance of the laptops and users are upset. What did the CISO do wrong? (choose the BEST answer):
An organization has a stated requirement to block certain traffic on networks. The implementation of controls will disrupt a manufacturing process and cause unacceptable delays, resulting in sever revenue disruptions. Which of the following is MOST likely to be responsible for accepting the risk until mitigating controls can be implemented?
What oversight should the information security team have in the change management process for application security?
Which of the following represents the best method of ensuring business unit alignment with security program requirements?