Which of the following BEST ensures timely and reliable access to services?
Senior management has expressed concern that the organization's intrusion prevention system (IPS) may repeatedly disrupt business operations Which of the following BEST indicates that the information security manager has tuned the system to address this concern?
Which of the following is MOST important to the successful implementation of an information security program?
Which of the following would BEST enable the timely execution of an incident response plan?
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
Which of the following is the PRIMARY reason for granting a security exception?
Which of the following should be done FIRST when developing a business continuity plan (BCP)?
Which of the following is the BEST course of action for an information security manager to align security and business goals?
What should be the FIRST step when an Internet of Things (loT) device in an organization's network is confirmed to have been hacked?
Which of the following is the PRIMARY benefit of an information security awareness training program?
An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?
Which of the following provides the MOST useful information for identifying security control gaps on an application server?
Implementing the principle of least privilege PRIMARILY requires the identification of:
Which of the following should be the PRIMARY focus of a status report on the information security program to senior management?
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
The PRIMARY advantage of involving end users in continuity planning is that they:
Which of the following metrics provides the BEST evidence of alignment of information security governance with corporate governance?
An organization is about to purchase a rival organization. The PRIMARY reason for performing information security due diligence prior to making the purchase is to:
Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?
An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining: