Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?
Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?
Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?
Which of the following would BEST support the business case for an increase in the information security budget?
Which of the following is MOST important in order to obtain senior leadership support when presenting an information security strategy?
Which of the following desired outcomes BEST supports a decision to invest in a new security initiative?
The contribution of recovery point objective (RPO) to disaster recovery is to:
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
Which of the following is the MOST important consideration when determining which type of failover site to employ?
Which of the following should be done FIRST after a ransomware incident has been successfully contained?
An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
To ensure that a new application complies with information security policy, the BEST approach is to:
Which of the following should be the PRIMARY goal of information security?
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
The BEST way to integrate information security governance with corporate governance is to ensure:
Which of the following is the BEST indicator of a successful intrusion into an organization's systems?
Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?
An organization has discovered that a server processing real-time visual data could be vulnerable to a lateral movement stage in a ransomware attack. Which of the following controls BEST mitigates this vulnerability?
Which of the following should be an information security manager's FIRST course of action when a potential business breach is discovered in a critical business system?