Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following should an information security manager do FIRST when there is a conflict between the organization's information security policy and a local regulation?

A.

Enforce the local regulation.

B.

Obtain legal guidance.

C.

Enforce the organization's information security policy.

D.

Obtain an independent assessment of the regulation.

Which of the following is MOST important to the effectiveness of an information security steering committee?

A.

The committee has strong regulatory knowledge.

B.

The committee is comprised of representatives from senior management.

C.

The committee has cross-organizational representation.

D.

The committee uses a risk management framework.

Which of the following should be the NEXT step after a security incident has been reported?

A.

Recovery

B.

Investigation

C.

Escalation

D.

Containment

An information security manager has confirmed the organization's cloud provider has unintentionally published some of the organization's business data. Which of the following should be done NEXT?

A.

Identify users associated with the exposed data.

B.

Initiate the organization's data loss prevention (DLP) processes.

C.

Review the cloud provider's service level agreement (SLA).

D.

Invoke the incident response plan.

During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:

A.

baseline security controls.

B.

benchmarking security metrics.

C.

security objectives.

D.

cost-benefit analyses.

A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?

A.

Right of the subscriber to conduct onsite audits of the vendor

B.

Escrow of software code with conditions for code release

C.

Authority of the subscriber to approve access to its data

D.

Commingling of subscribers' data on the same physical server

In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:

A.

evaluate results of the most recent incident response test.

B.

review the number of reported security incidents.

C.

ensure established security metrics are reported.

D.

assess progress of risk mitigation efforts.

An organization has an ongoing security awareness training program. Employee participation has been decreasing over the year, while the number of malware and phishing incidents from email has been increasing. What is the information security manager's BEST course of action?

A.

Report the findings to senior management with recommendations.

B.

Implement a phishing reporting tool in the email system.

C.

Include regular phishing campaigns after each training session.

D.

Make the training program mandatory for all employees.

Which of the following is the BEST way to determine the gap between the present and desired state of an information security program?

A.

Perform a risk analysis for critical applications.

B.

Determine whether critical success factors (CSFs) have been defined.

C.

Conduct a capability maturity model evaluation.

D.

Review and update current operational procedures.

To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?

A.

Data storage procedures

B.

Data classification policy

C.

Results of penetration testing

D.

Features of data protection products

Which of the following is MOST important for the information security manager to include when presenting changes in the security risk profile to senior management?

A.

Industry benchmarks

B.

Security training test results

C.

Performance measures for existing controls

D.

Number of false positives

Which of the following is MOST important for guiding the development and management of a comprehensive information security program?

A.

Adopting information security program management best practices

B.

Implementing policies and procedures to address the information security strategy

C.

Aligning the organization's business objectives with IT objectives

D.

Establishing and maintaining an information security governance framework

Which of the following should be established FIRST when implementing an information security governance framework?

A.

Security architecture

B.

Security policies

C.

Security incident management team

D.

Security awareness training program

When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?

A.

Risk owner

B.

Control owner

C.

Business system owner

D.

Application owner

Which of the following is MOST important for the improvement of a business continuity plan (BCP)?

A.

Incorporating lessons learned

B.

Implementing an IT resilience solution

C.

Implementing management reviews

D.

Documenting critical business processes

Which of the following is the MOST effective defense against malicious insiders compromising confidential information?

A.

Regular audits of access controls

B.

Strong background checks when hiring staff

C.

Prompt termination procedures

D.

Role-based access control (RBAC)

A department has reported that a security control is no longer effective. Which of the following is the information security manager's BEST course of action?

A.

Assess the control state.

B.

Replace the control.

C.

Report the failure to management.

D.

Check for defense in depth.

Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?

A.

Publish adopted information security standards.

B.

Perform annual information security compliance reviews.

C.

Implement an information security governance framework.

D.

Define penalties for information security noncompliance.

Which of the following BEST protects against emerging advanced persistent threat (APT) actors?

A.

Honeypot environment

B.

Updated security awareness materials

C.

Ongoing incident response training

D.

Proactive monitoring

In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.

Before relying on this certification, it is MOST important that the information security manager confirms that the:

A.

current international standard was used to assess security processes.

B.

certification will remain current through the life of the contract.

C.

certification scope is relevant to the service being offered.

D.

certification can be extended to cover the client's business.