Which of the following should be the FIRST step of incident response procedures?
#91
Answer: A✅ Correct❌ Incorrect
Which of the following is the BEST method for reducing the risk of data loss due to phishing attacks?
#92
Answer: D✅ Correct❌ Incorrect
Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?
#93
Answer: C✅ Correct❌ Incorrect
Which of the following is MOST important to the effectiveness of an information security program?
#94
Answer: D✅ Correct❌ Incorrect
Conducting a business impact analysis (BIA) BEST helps to identify:
#95
Answer: D✅ Correct❌ Incorrect
An employee who denies accusations of downloading inappropriate material to an organizational device has been discharged. In support of the disciplinary action the collection of legal evidence is required. Which of the following is the information security manager's BEST recommendation?
#96
Answer: B✅ Correct❌ Incorrect
An information security manager wants to implement a security information and event management (SIEM) system that will aggregate log data from all systems that control perimeter access. Which of the following would BEST support the business case for this initiative to senior management?
#97
Answer: C✅ Correct❌ Incorrect
Which of the following BEST protects against phishing attacks?
#98
Answer: A✅ Correct❌ Incorrect
The PRIMARY objective of performing a post-incident review is to:
#99
Answer: A✅ Correct❌ Incorrect
In a call center, the BEST reason to conduct a social engineering exercise is to:
#100
Answer: D✅ Correct❌ Incorrect
An information security risk analysis BEST assists an organization in ensuring that:
#101
Answer: B✅ Correct❌ Incorrect
Which of the following is the MOST effective way to address an organization's security concerns during contract negotiations with a third party?
#102
Answer: C✅ Correct❌ Incorrect
Which of the following would BEST enable effective decision-making?
#103
Answer: C✅ Correct❌ Incorrect
Which of the following is the BEST option to lower the cost to implement application security controls?
#104
Answer: D✅ Correct❌ Incorrect
Which of the following is the GREATEST benefit of effective information security governance?
#105
Answer: A✅ Correct❌ Incorrect
Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?
#106
Answer: D✅ Correct❌ Incorrect
Which of the following would be the MOST effective use of findings from a post-incident review?
#107
Answer: A✅ Correct❌ Incorrect
During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?
#108
Answer: A✅ Correct❌ Incorrect
Which of the following is MOST helpful in determining the realization of benefits from an information security program?
#109
Answer: D✅ Correct❌ Incorrect
During an internal compliance review, the review team discovers that a critical legacy application is unable to meet the organization's mandatory security requirements. Which of the following should be done FIRST?
#110
Answer: A✅ Correct❌ Incorrect
Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?
#111
Answer: A✅ Correct❌ Incorrect
Which of the following is the PRIMARY benefit of an information security awareness training program?
#112
Answer: C✅ Correct❌ Incorrect
Which of the following MOST effectively supports an organization's security culture?
#113
Answer: C✅ Correct❌ Incorrect
A new type of ransomware has infected an organization's network. Which of the following would have BEST enabled the organization to detect this situation?
#114
Answer: D✅ Correct❌ Incorrect
Which of the following should an information security manager do FIRST upon notification of a potential security risk associated with a third-party service provider?
#115
Answer: D✅ Correct❌ Incorrect
Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?
#116
Answer: C✅ Correct❌ Incorrect
Which of the following is BEST used to determine the maturity of an information security program?
#117
Answer: C✅ Correct❌ Incorrect
Which of the following should be done FIRST when developing an information security strategy that is aligned with organizational goals?
#118
Answer: C✅ Correct❌ Incorrect
A business impact analysis (BIA) BEST enables an organization to establish:
#119
Answer: C✅ Correct❌ Incorrect
Which of the following is the PRIMARY objective of developing an information security program that aligns with the information security strategy?