Which of the following should an information security manager do FIRST when there is a conflict between the organization's information security policy and a local regulation?
Which of the following is MOST important to the effectiveness of an information security steering committee?
Which of the following should be the NEXT step after a security incident has been reported?
An information security manager has confirmed the organization's cloud provider has unintentionally published some of the organization's business data. Which of the following should be done NEXT?
During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:
A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?
In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:
An organization has an ongoing security awareness training program. Employee participation has been decreasing over the year, while the number of malware and phishing incidents from email has been increasing. What is the information security manager's BEST course of action?
Which of the following is the BEST way to determine the gap between the present and desired state of an information security program?
To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?
Which of the following is MOST important for the information security manager to include when presenting changes in the security risk profile to senior management?
Which of the following is MOST important for guiding the development and management of a comprehensive information security program?
Which of the following should be established FIRST when implementing an information security governance framework?
When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?
Which of the following is MOST important for the improvement of a business continuity plan (BCP)?
Which of the following is the MOST effective defense against malicious insiders compromising confidential information?
A department has reported that a security control is no longer effective. Which of the following is the information security manager's BEST course of action?
Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?
Which of the following BEST protects against emerging advanced persistent threat (APT) actors?
In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.
Before relying on this certification, it is MOST important that the information security manager confirms that the: