Which of the following is the PRIMARY objective of a business impact analysis (BIA)?
Which of the following should an information security manager do FIRST upon learning that a competitor has experienced a ransomware attack?
An organization is in the process of defining policies for employee use of social media. It is MOST important for the information security manager to:
Detailed business continuity plans (BCPs) should be PRIMARILY based on:
Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?
Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?
Which of the following is the PRIMARY objective of a cyber resilience strategy?
Which of the following would BEST justify continued investment in an information security program?
When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:
A security incident has been reported within an organization When should an information security manager contact the information owner?
Which of the following eradication methods is MOST appropriate when responding to an incident resulting in malware on an application server?
An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?
An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?
Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
The PRIMARY purpose of vulnerability identification is to:
Which of the following should be the MOST important consideration of business continuity management?
Of the following, who is accountable for data loss in the event of an information security incident at a third-party provider?
Which of the following is the BEST way to compete for funding for an information security program in an organization with limited resources?
When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?