An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?
The MOST important reason for having an information security manager serve on the change management committee is to:
Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
Which of the following is the BEST approach for governing noncompliance with security requirements?
Which of the following should be the PRIMARY consideration when developing an incident response plan?
Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?
Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?
Which of the following is the PRIMARY objective of testing security controls within a critical infrastructure?
Which of the following business units should own the data that populates an identity management system?
A business continuity plan (BCP) should contain:
Which of the following is the MOST effective way to prevent information security incidents?
Which of the following is BEST used to determine the maturity of an information security program?
Which of the following should include contact information for representatives of equipment and software vendors?
Which of the following change management procedures is MOST likely to cause concern to the information security manager?
Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?
Which of the following is MOST likely to reduce the effectiveness of a SIEM system?
A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?
A new risk has been identified in a high availability system. The BEST course of action is to:
Which of the following is the MOST important outcome of effective risk treatment?
An information security program is BEST positioned for success when it is closely aligned with: