Which of the following is MOST important to include in an information security strategy?
#31
Answer: B✅ Correct❌ Incorrect
The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:
#32
Answer: A✅ Correct❌ Incorrect
Which of the following is the MOST important issue in a penetration test?
#33
Answer: C✅ Correct❌ Incorrect
An organization has decided to conduct a postmortem analysis after experiencing a loss from an information security attack. The PRIMARY purpose of this analysis should be to:
#34
Answer: C✅ Correct❌ Incorrect
When a critical system incident is reported, the FIRST step of the incident handler should be to:
#35
Answer: C✅ Correct❌ Incorrect
An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?
#36
Answer: A✅ Correct❌ Incorrect
Which of the following BEST enables an organization to determine what activities and changes have occurred on a system during a cybersecurity incident?
#37
Answer: C✅ Correct❌ Incorrect
Which of the following should the information security manager do FIRST upon learning that a business department wants to use blockchain technology for a new payment process?
#38
Answer: C✅ Correct❌ Incorrect
Which of the following BEST facilitates the development of information security procedures that effectively support the information security policy?
#39
Answer: B✅ Correct❌ Incorrect
Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?
#40
Answer: C✅ Correct❌ Incorrect
Which of the following is the GREATEST benefit of using cyber threat intelligence to improve an organization's patch management program?
#41
Answer: D✅ Correct❌ Incorrect
Which of the following methods enables the MOST rigorous testing while avoiding the disruption of normal business operations?
#42
Answer: C✅ Correct❌ Incorrect
Which of the following is the BEST way to build a risk-aware culture?
#43
Answer: D✅ Correct❌ Incorrect
Which of the following would be MOST useful to help senior management understand the status of information security compliance?
#44
Answer: A✅ Correct❌ Incorrect
An empowered security steering committee has decided to accept a critical risk. Which of the following is the information security manager's BEST course of action?
#45
Answer: D✅ Correct❌ Incorrect
The MOST important element in achieving executive commitment to an information security governance program is:
#46
Answer: A✅ Correct❌ Incorrect
Which of the following BEST prepares a computer incident response team for a variety of information security scenarios?
#47
Answer: A✅ Correct❌ Incorrect
Which of the following recovery approaches generally has the LOWEST periodic cost?
#48
Answer: D✅ Correct❌ Incorrect
Which of the following tasks should he performed once a disaster recovery plan (DRP) has been developed?
#49
Answer: B✅ Correct❌ Incorrect
Which of the following should be the MOST important consideration of business continuity management?
#50
Answer: A✅ Correct❌ Incorrect
Which of the following is the PRIMARY objective of a cyber resilience strategy?
#51
Answer: A✅ Correct❌ Incorrect
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
#52
Answer: C✅ Correct❌ Incorrect
Which of the following is the BEST indication that an information security control is no longer relevant?
#53
Answer: B✅ Correct❌ Incorrect
Which of the following is the PRIMARY advantage of an organization using Disaster Recovery as a Service (DRaaS) to help manage its disaster recovery program?
#54
Answer: B✅ Correct❌ Incorrect
An organization wants to enable digital forensics for a business-critical application. Which of the following will BEST help to support this objective?
#55
Answer: D✅ Correct❌ Incorrect
A multinational organization is introducing a security governance framework. The information security manager's concern is that regional security practices differ.
Which of the following should be evaluated FIRST?
#56
Answer: D✅ Correct❌ Incorrect
Several months after the installation of a new firewall with intrusion prevention features to block malicious activity, a breach was discovered that came in through the firewall shortly after installation. This breach could have been detected earlier by implementing firewall:
#57
Answer: D✅ Correct❌ Incorrect
Which of the following BEST enables successful identification of a potential IT security incident?
#58
Answer: B✅ Correct❌ Incorrect
Which of the following is MOST important when providing updates during a security incident?
#59
Answer: B✅ Correct❌ Incorrect
Which of the following BEST demonstrates the added value of an information security program?