Which of the following BEST enables an information security manager to obtain organizational support for the implementation of security controls?
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?
Which of the following would be MOST helpful when creating information security policies?
An organization has determined that fixing a security vulnerability in a critical application is too costly to be feasible, but the impact is material to the business. Which of the following is the MOST appropriate risk treatment?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?
Security administration efforts will be greatly reduced following the deployment of which of the following techniques?
Which of the following should be done FIRST when a SIEM flags a potential event?
Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?
Which of the following should be the FIRST step when performing triage of a malware incident?
Which of the following is the PRIMARY responsibility of an information security governance committee?
Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?
Which is the BEST method to evaluate the effectiveness of an alternate processing site when continuous uptime is required?
Which of the following is the BEST indication that an organization has a mature information security culture?
Which of the following should be updated FIRST to account for new regulatory requirements that impact current information security controls?
Which of the following messages would be MOST effective in obtaining senior management's commitment to information security management?
Who should be responsible for determining the level of data classification required for an application related to a new line of business?
An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:
• A bad actor broke into a business-critical FTP server by brute forcing an administrative password
• The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
• The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
• After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail
Which of the following could have been prevented by conducting regular incident response testing?
When an organization experiences a disruptive event, the business continuity plan (BCP) should be triggered PRIMARILY based on: