Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?

A.

Control owner responses based on a root cause analysis

B.

The impact of noncompliance on the organization's risk profile

C.

A noncompliance report to initiate remediation activities

D.

A business case for transferring the risk

The MOST important reason for having an information security manager serve on the change management committee is to:

A.

identify changes to the information security policy.

B.

ensure that changes are tested.

C.

ensure changes are properly documented.

D.

advise on change-related risk.

Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?

A.

Inform the public relations officer.

B.

Monitor the third party's response.

C.

Invoke the incident response plan.

D.

Inform customers of the breach.

Which of the following is the BEST approach for governing noncompliance with security requirements?

A.

Base mandatory review and exception approvals on residual risk,

B.

Require users to acknowledge the acceptable use policy.

C.

Require the steering committee to review exception requests.

D.

Base mandatory review and exception approvals on inherent risk.

Which of the following should be the PRIMARY consideration when developing an incident response plan?

A.

The definition of an incident

B.

Compliance with regulations

C.

Management support

D.

Previously reported incidents

Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?

A.

To ensure industry best practices for enterprise security are followed

B.

To establish the minimum level of controls needed

C.

To determine the desired state of enterprise security

D.

To satisfy auditors' recommendations for enterprise security

Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?

A.

A capability and maturity assessment

B.

Detailed analysis of security program KPIs

C.

An information security dashboard

D.

An information security risk register

Which of the following is the PRIMARY objective of testing security controls within a critical infrastructure?

A.

Ensuring the continued resilience and security of IT services

B.

Decreasing the percentage of security deployments that cause failures in production

C.

Reducing the number of control assessments to optimize resources

D.

Identifying and addressing security team performance issues

Which of the following business units should own the data that populates an identity management system?

A.

Human resources (HR)

B.

Legal

C.

Information technology

D.

Information security

A business continuity plan (BCP) should contain:

A.

information about eradication activities.

B.

hardware and software inventories.

C.

data restoration procedures.

D.

criteria for activation.

Which of the following is the MOST effective way to prevent information security incidents?

A.

Implementing a security information and event management (SIEM) tool

B.

Implementing a security awareness training program for employees

C.

Deploying a consistent incident response approach

D.

Deploying intrusion detection tools in the network environment

Which of the following is BEST used to determine the maturity of an information security program?

A.

Security budget allocation

B.

Organizational risk appetite

C.

Risk assessment results

D.

Security metrics

Which of the following should include contact information for representatives of equipment and software vendors?

A.

Information security program charter

B.

Business impact analysis (BIA)

C.

Service level agreements (SLAs)

D.

Business continuity plan (BCP)

Which of the following change management procedures is MOST likely to cause concern to the information security manager?

A.

Fallback processes are tested the weekend before changes are made

B.

Users are not notified of scheduled system changes

C.

A manual rather than an automated process is used to compare program versions.

D.

The development manager migrates programs into production

Which of the following is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?

A.

Risk assessment program

B.

Information security awareness training

C.

Information security governance

D.

Information security metrics

Which of the following is MOST likely to reduce the effectiveness of a SIEM system?

A.

Lack of multi-factor authentication (MFA) for system access

B.

Weakly encrypted log files

C.

Misconfiguration of alert thresholds

D.

Complex user interface

A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?

A.

Automate user provisioning activities.

B.

Maintain strict control over user provisioning activities.

C.

Formally document IT administrator activities.

D.

Implement monitoring of IT administrator activities.

A new risk has been identified in a high availability system. The BEST course of action is to:

A.

Perform a cost-benefit analysis for mitigating controls

B.

Recommend risk acceptance to the business owner

C.

Develop and implement a plan to mitigate the identified risk

D.

Evaluate and prioritize the identified risk

Which of the following is the MOST important outcome of effective risk treatment?

A.

Elimination of risk

B.

Timely reporting of incidents

C.

Reduced cost of acquiring controls

D.

Implementation of corrective actions

An information security program is BEST positioned for success when it is closely aligned with:

A.

information security best practices.

B.

recognized industry frameworks.

C.

information security policies.

D.

the information security strategy.