The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
An organization requires that business-critical applications be recovered within 30 minutes in the event of a disaster. Which of the following metrics should be defined in the business continuity plan (BCP) to manage this requirement?
To help ensure that an information security training program is MOST effective, its contents should be:
To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?
What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?
An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?
Which of the following metrics is MOST appropriate for evaluating the incident notification process?
Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?
Which of the following BEST enables an organization to determine what activities and changes have occurred on a system during a cybersecurity incident?
An experienced information security manager joins a new organization and begins by conducting an audit of all key IT processes. Which of the following findings about the vulnerability management program should be of GREATEST concern?
The PRIMARY consideration when responding to a ransomware attack should be to ensure:
A business continuity plan (BCP) should contain:
Which of the following is MOST important to convey to employees in building a security risk-aware culture?
To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:
The effectiveness of an information security governance framework will BEST be enhanced if:
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
Which of the following would be MOST important to include in a proposal justifying investments for an organization's information security program?
Which of the following is the BEST indication of an effective disaster recovery planning process?
Which of the following BEST ensures information security governance is aligned with corporate governance?
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?