Which of the following should be the MOST important consideration when establishing information security policies for an organization?
What is the PRIMARY benefit to an organization when information security program requirements are aligned with employment and staffing processes?
Which of the following BEST demonstrates the added value of an information security program?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?
Which of the following service offerings in a typical Infrastructure as a Service (laaS) model will BEST enable a cloud service provider to assist customers when recovering from a security incident?
Which of the following is the PRIMARY benefit of implementing an information security governance framework?
How does an organization PRIMARILY benefit from the creation of an information security steering committee?
Which of the following BEST enables the assignment of risk and control ownership?
An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?
Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?
Which of the following should be the GREATEST concern for an information security manager when an annual audit reveals the organization's business continuity plan (BCP) has not been reviewed or updated in more than a year?
Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?
An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?
Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?
To effectively manage an organization's information security risk, it is MOST important to:
Which of the following is PRIMARILY determined by asset classification?
An organization is considering using a third party to host sensitive archived data. Which of the following is MOST important to verify before entering into the relationship?
An information security team has confirmed that threat actors are taking advantage of a newly announced critical vulnerability within an application. Which of the following should be done
FIRST?
Which is following should be an information security manager's PRIMARY focus during the development of a critical system storing highly confidential data?