Which of the following is the BEST tool to monitor the effectiveness of information security governance?
An organization's automated security monitoring tool generates an excessively large amount of falsq positives. Which of the following is the BEST method to optimize the monitoring process?
From a business perspective, the GREATEST benefit of an incident response plan is that it:
Which of the following is MOST important when developing an information security strategy?
Which of the following will BEST facilitate timely and effective incident response?
An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?
A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?
Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?
Which of the following BEST indicates misalignment of security policies with business objectives?
An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?
An organization is experiencing a sharp increase in incidents related to phishing messages. The root cause is an outdated email filtering system that is no longer supported by the vendor. Which of the following should be the information security manager's FIRST course of action?
Which of the following should be done FIRST when establishing an information security governance framework?
An organization is planning to outsource network management to a service provider. Including which of the following in the contract would be the MOST effective way to mitigate information security risk?
Which of the following would provide the BEST evidence to senior management that security control performance has improved?
Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?
An organization would like to invest in a new emerging technology. Which of the following is MOST important for the information security manager to consider when evaluating its impact?
Which of the following is the BEST strategy when determining an organization's approach to risk treatment?
Which of the following is MOST important for the effective implementation of an information security governance program?
What should be the FIRST step when implementing data loss prevention (DLP) technology?
Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?