Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following is the PRIMARY objective of a business impact analysis (BIA)?

A.

Determine recovery priorities.

B.

Define the recovery point objective (RPO).

C.

Confirm control effectiveness.

D.

Analyze vulnerabilities.

Which of the following should an information security manager do FIRST upon learning that a competitor has experienced a ransomware attack?

A.

Perform a full data backup.

B.

Conduct ransomware awareness training for all staff.

C.

Update indicators of compromise in the security systems.

D.

Review the current risk assessment.

An organization is in the process of defining policies for employee use of social media. It is MOST important for the information security manager to:

A.

Assign accountability for monitoring social media

B.

Identify security monitoring tools

C.

Evaluate risks to the organization

D.

Develop security awareness training

Detailed business continuity plans (BCPs) should be PRIMARILY based on:

A.

strategies validated by senior management.

B.

capabilities of available local vendors.

C.

strategies that cover all applications.

D.

cost and resources needed to execute.

Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?

A.

The security strategy is promoted.

B.

Fewer security incidents are reported.

C.

Security behavior is improved.

D.

More security incidents are detected.

Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?

A.

Removable storage media

B.

Disaster recovery plan (DRP)

C.

Offsite data backups

D.

Encrypted data drives

Which of the following is the PRIMARY objective of a cyber resilience strategy?

A.

Business continuity

B.

Regulatory compliance

C.

Employee awareness

D.

Executive support

Which of the following would BEST justify continued investment in an information security program?

A.

Reduction in residual risk

B.

Security framework alignment

C.

Speed of implementation

D.

Industry peer benchmarking

When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:

A.

ensure alignment with industry encryption standards.

B.

ensure that systems that handle credit card data are segmented.

C.

review industry best practices for handling secure payments.

D.

review corporate policies regarding credit card information.

A security incident has been reported within an organization When should an information security manager contact the information owner?

A.

After the incident has been mitigated

B.

After the incident has been confirmed.

C.

After the potential incident has been togged

D.

After the incident has been contained

Which of the following eradication methods is MOST appropriate when responding to an incident resulting in malware on an application server?

A.

Disconnect the system from the network.

B.

Change passwords on the compromised system.

C.

Restore the system from a known good backup.

D.

Perform operation system hardening.

An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?

A.

Review independent security assessment reports for each vendor.

B.

Benchmark each vendor's services with industry best practices.

C.

Analyze the risks and propose mitigating controls.

D.

Define information security requirements and processes.

An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?

A.

Preventive

B.

Corrective

C.

Detective

D.

Deterrent

Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?

A.

Mail relay server

B.

Proxy server

C.

Database server

D.

Application server

Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?

A.

Create a security exception.

B.

Perform a gap analysis to determine needed resources.

C.

Perform a vulnerability assessment.

D.

Assess the risk to business operations.

The PRIMARY purpose of vulnerability identification is to:

A.

Remediate vulnerabilities before they are exploited

B.

Discover control deficiencies

C.

Provide vulnerability identifiers for risk reporting

D.

Prioritize vulnerability remediation

Which of the following should be the MOST important consideration of business continuity management?

A.

Ensuring human safety

B.

Identifying critical business processes

C.

Ensuring the reliability of backup data

D.

Securing critical information assets

Of the following, who is accountable for data loss in the event of an information security incident at a third-party provider?

A.

The information security manager

B.

The service provider that hosts the data

C.

The incident response team

D.

The business data owner

Which of the following is the BEST way to compete for funding for an information security program in an organization with limited resources?

A.

Demonstrate the effectiveness of business continuity plans (BCPs).

B.

Report key performance indicator (KPI) trends.

C.

Demonstrate that the program enables business activities.

D.

Provide evidence of increased security events at peer organizations.

When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?

A.

Purchase forensic standard operating procedures.

B.

Provide forensics training to the information security team.

C.

Ensure the incident response policy allows hiring a forensics firm.

D.

Retain a forensics firm prior to experiencing an incident.