Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is the BEST tool to monitor the effectiveness of information security governance?

A.

Key performance indicators (KPIs)

B.

Balanced scorecard

C.

Business impact analysis (BIA)

D.

Risk profile

An organization's automated security monitoring tool generates an excessively large amount of falsq positives. Which of the following is the BEST method to optimize the monitoring process?

A.

Report only critical alerts.

B.

Change reporting thresholds.

C.

Reconfigure log recording.

D.

Monitor incidents in a specific time frame.

From a business perspective, the GREATEST benefit of an incident response plan is that it:

A.

Promotes efficiency by providing predefined response procedures

B.

Improves security responsiveness to disruptive events

C.

Limits the negative impact of disruptive events

D.

Ensures compliance with regulatory requirements

Which of the following is MOST important when developing an information security strategy?

A.

Engage stakeholders.

B.

Assign data ownership.

C.

Determine information types.

D.

Classify information assets.

Which of the following will BEST facilitate timely and effective incident response?

A.

Including penetration test results in incident response planning

B.

Assessing the risk of compromised assets

C.

Classifying the severity of an incident

D.

Notifying stakeholders when invoking the incident response plan

An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?

A.

Red team exercise

B.

Black box penetration test

C.

Disaster recovery exercise

D.

Tabletop exercise

A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?

A.

Invoke the incident response plan

B.

Implement role-based access control (RBAC)

C.

Remove access to the information

D.

Delete the information from the file server

Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?

A.

Security risk analysis

B.

Gap assessment

C.

Maturity assessment

D.

Vulnerability scan report

Which of the following BEST indicates misalignment of security policies with business objectives?

A.

Low completion rate of employee awareness training

B.

Lack of adequate funding for the security program

C.

A large number of long-term policy exceptions

D.

A large number of user noncompliance incidents

An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?

A.

Present a diagram of core Zero Trust logical components to help visualize the architectural changes

B.

Summarize the training plan and end user feedback in an internal portal and send the link to the board

C.

Prepare a report on the Zero Trust implementation that includes a status dashboard and timeline

D.

Provide an outline of the business impact in terms of risk reduction and changes in user experience

An organization is experiencing a sharp increase in incidents related to phishing messages. The root cause is an outdated email filtering system that is no longer supported by the vendor. Which of the following should be the information security manager's FIRST course of action?

A.

Reinforce security awareness practices for end users.

B.

Temporarily outsource the email system to a cloud provider.

C.

Develop a business case to replace the system.

D.

Monitor outgoing traffic on the firewall.

Which of the following should be done FIRST when establishing an information security governance framework?

A.

Evaluate information security tools and skills relevant for the environment.

B.

Gain an understanding of the business and cultural attributes.

C.

Contract a third party to conduct an independent review of the program.

D.

Conduct a cost-benefit analysis of the framework.

An organization is planning to outsource network management to a service provider. Including which of the following in the contract would be the MOST effective way to mitigate information security risk?

A.

Requirement for regular information security awareness

B.

Right-to-audit clause

C.

Service level agreement (SLA)

D.

Requirement to comply with corporate security policy

Which of the following would provide the BEST evidence to senior management that security control performance has improved?

A.

Demonstrated return on security investment

B.

Reduction in inherent risk

C.

Results of an emerging threat analysis

D.

Review of security metrics trends

Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?

A.

Implement a mobile device policy and standard.

B.

Provide employee training on secure mobile device practices.

C.

Implement a mobile device management (MDM) solution.

D.

Require employees to install an effective anti-malware app.

An organization would like to invest in a new emerging technology. Which of the following is MOST important for the information security manager to consider when evaluating its impact?

A.

Secure configuration

B.

Vulnerabilities in the technology

C.

Systems compatibility

D.

Industry peer reviews of the technology

Which of the following is the BEST strategy when determining an organization's approach to risk treatment?

A.

Implementing risk mitigation controls that are considered quick wins

B.

Prioritizing controls that directly mitigate the organization's most critical risks

C.

Advancing the maturity of existing controls based on risk tolerance

D.

Implementing a one-size-fits-all set of controls across all organizational units

Which of the following is MOST important for the effective implementation of an information security governance program?

A.

Employees receive customized information security training

B.

The program budget is approved and monitored by senior management

C.

The program goals are communicated and understood by the organization.

D.

Information security roles and responsibilities are documented.

What should be the FIRST step when implementing data loss prevention (DLP) technology?

A.

Perform due diligence with vendor candidates.

B.

Build a business case.

C.

Classify the organization's data.

D.

Perform a cost-benefit analysis.

Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?

A.

Escalation processes

B.

Technological capabilities

C.

Recovery time objective (RTO)

D.

Security audit reports