Which of the following is MOST important to include in an information security framework?
#61
Answer: D✅ Correct❌ Incorrect
The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning process is to:
#62
Answer: D✅ Correct❌ Incorrect
An organization learns that a service provider experienced a breach last month and did not notify the organization. Which of the following should be the information security manager's FIRST course of action?
#63
Answer: D✅ Correct❌ Incorrect
Which of the following approaches to communication with senior management BEST enables an information security manager to maximize the effectiveness of the information security program?
#64
Answer: B✅ Correct❌ Incorrect
Which of the following control types should be considered FIRST for aligning employee behavior with an organization's information security objectives?
#65
Answer: A✅ Correct❌ Incorrect
An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?
#66
Answer: D✅ Correct❌ Incorrect
The business value of an information asset is derived from:
#67
Answer: B✅ Correct❌ Incorrect
Which of the following is the BEST indicator of the maturity level of a vendor risk management process?
#68
Answer: B✅ Correct❌ Incorrect
Which of the following is the BEST way for an information security manager to justify ongoing annual maintenance fees associated with an intrusion prevention system (IPS)?
#69
Answer: A✅ Correct❌ Incorrect
An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?
#70
Answer: C✅ Correct❌ Incorrect
In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?
#71
Answer: B✅ Correct❌ Incorrect
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
#72
Answer: A✅ Correct❌ Incorrect
Which of the following is MOST important to include in a post-incident report?
#73
Answer: C✅ Correct❌ Incorrect
When creating an incident response plan, the triggers for the business continuity plan (BCP) MUST be based on:
#74
Answer: C✅ Correct❌ Incorrect
An organization's information security strategy should be the PRIMARY input to which of the following?
#75
Answer: A✅ Correct❌ Incorrect
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
#76
Answer: D✅ Correct❌ Incorrect
Which of the following is the BEST indication of information security strategy alignment with the business?
#77
Answer: D✅ Correct❌ Incorrect
Which of the following would BEST mitigate accidental data loss events?
#78
Answer: C✅ Correct❌ Incorrect
Which of the following is a PRIMARY function of an incident response team?
#79
Answer: D✅ Correct❌ Incorrect
Using which of the following metrics will BEST help to determine the resiliency of IT infrastructure security controls?
#80
Answer: B✅ Correct❌ Incorrect
Which of the following has the MOST influence on the information security investment process?
#81
Answer: B✅ Correct❌ Incorrect
An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:
✑ A bad actor broke into a business-critical FTP server by brute forcing an administrative password
✑ The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
✑ The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
✑ After three (3) hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail
Which of the following could have been prevented by conducting regular incident response testing?
#82
Answer: D✅ Correct❌ Incorrect
Which of the following is MOST important when designing an information security governance framework?
#83
Answer: C✅ Correct❌ Incorrect
A serious vulnerability was detected in a business application that can be exploited by external attackers to compromise the system. What is the information security manager's BEST course of action?
#84
Answer: C✅ Correct❌ Incorrect
Which of the following is MOST important to consider when defining escalation processes for incident response procedures?
#85
Answer: C✅ Correct❌ Incorrect
Which of the following is the MAIN reason for integrating an organization's incident response plan with its business continuity process?
#86
Answer: A✅ Correct❌ Incorrect
Which of the following should be the PRIMARY basis for a severity hierarchy for information security incident classification?
#87
Answer: D✅ Correct❌ Incorrect
Which of the following would BEST enable the timely execution of an incident response plan?
#88
Answer: A✅ Correct❌ Incorrect
Which of the following is the BEST approach to identify new security issues associated with IT systems and applications in a timely manner?
#89
Answer: D✅ Correct❌ Incorrect
When designing security controls, it is MOST important to: