During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?
An organization has implemented a new customer relationship management (CRM) system. Who should be responsible for enforcing authorized and controlled access to the CRM data?
Which of the following is the GREATEST benefit of using AI tools in security operations?
Which type of control is an incident response team?
Which of the following is the MOST effective way to ensure the security of services and solutions delivered by third-party vendors?
When establishing metrics for an information security program, the BEST approach is to identify indicators that:
Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?
Which of the following provides the BEST evidence that a recently established infofmation security program is effective?
Which of the following has the GREATEST influence on the successful integration of information security within the business?
Which of the following will ensure confidentiality of content when accessing an email system over the Internet?
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
A risk assessment exercise has identified the threat of a denial of service (DoS) attack Executive management has decided to take no further action related to this risk. The MO ST likely reason for this decision is
A software vendor has announced a zero-day vulnerability that exposes an organization's critical business systems. The vendor has released an emergency patch. Which of the following should be the information security managers PRIMARY concern?
Which of the following is MOST helpful in determining the criticality of an organization's business functions?
Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?
An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?
Which of the following should be the MOST important consideration when reviewing an information security strategy?
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
Which of the following is MOST critical when creating an incident response plan?