A security incident has been reported within an organization. When should an information security manager contact the information owner?
#1
Answer: C✅ Correct❌ Incorrect
An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?
#2
Answer: C✅ Correct❌ Incorrect
Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?
#3
Answer: C✅ Correct❌ Incorrect
Which of the following information security practices would BEST prevent a SQL injection attack?
#4
Answer: C✅ Correct❌ Incorrect
Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?
#5
Answer: D✅ Correct❌ Incorrect
Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?
#6
Answer: D✅ Correct❌ Incorrect
An organization permits the storage and use of its critical and sensitive information on employee-owned smartphones. Which of the following is the BEST security control?
#7
Answer: D✅ Correct❌ Incorrect
A spear phishing attack was used to trick a user into installing a Trojan onto a workstation. Which of the following would have been MOST effective in preventing this attack from succeeding?
#8
Answer: A✅ Correct❌ Incorrect
Which of the following is the MOST effective method of preventing deliberate internal security breaches?
#9
Answer: D✅ Correct❌ Incorrect
An information security manager has been asked to provide regular status reports to senior management regarding the information security program. Which of the following would provide the MOST helpful information?
#10
Answer: D✅ Correct❌ Incorrect
The PRIMARY purpose of a penetration test is to:
#11
Answer: D✅ Correct❌ Incorrect
An information security policy was amended recently to support an organization's new information security strategy. Which of the following should be the information security manager's NEXT step?
#12
Answer: B✅ Correct❌ Incorrect
Which of the following needs to be established FIRST in order to categorize data properly?
#13
Answer: C✅ Correct❌ Incorrect
Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?
#14
Answer: B✅ Correct❌ Incorrect
An organization is performing an annual review of its risk landscape. Which of the following anticipated changes will have the MOST significant impact on the information security strategy?
#15
Answer: C✅ Correct❌ Incorrect
To optimize the implementation of information security governance in an organization, an information security manager should:
#16
Answer: B✅ Correct❌ Incorrect
Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?
#17
Answer: A✅ Correct❌ Incorrect
Which of the following should be the PRIMARY goal of information security?
#18
Answer: A✅ Correct❌ Incorrect
Which of the following clauses would represent the MOST significant potential exposure if included in a contract with a third-party service provider?
#19
Answer: B✅ Correct❌ Incorrect
Which of the following should be the PRIMARY basis for determining information security objectives?
#20
Answer: A✅ Correct❌ Incorrect
Which of the following is MOST helpful for determining priorities when creating a long-term information security roadmap?
#21
Answer: B✅ Correct❌ Incorrect
A KEY consideration in the use of quantitative risk analysis is that it:
#22
Answer: B✅ Correct❌ Incorrect
Which of the following is MOST important when selecting an information security metric?
#23
Answer: B✅ Correct❌ Incorrect
A situation where an organization has unpatched IT systems in violation of the patching policy should be treated as:
#24
Answer: C✅ Correct❌ Incorrect
How does data discovery assist with data classification?
#25
Answer: B✅ Correct❌ Incorrect
Which of the following will BEST facilitate timely and effective incident response?
#26
Answer: D✅ Correct❌ Incorrect
Which of the following MOST effectively communicates the current risk profile to senior management after controls are applied?
#27
Answer: A✅ Correct❌ Incorrect
Which of the following processes should be done NEXT after completing a business impact analysis (BIA)?
#28
Answer: C✅ Correct❌ Incorrect
Which of the following has the GREATEST impact on efforts to improve an organization's security posture?
#29
Answer: B✅ Correct❌ Incorrect
Which of the following is MOST important to include in an information security policy?