Which of the following is the BEST reason for senior management to support a business case for developing a monitoring system for a critical application?
#151
Answer: C✅ Correct❌ Incorrect
Which of the following is MOST important when developing an information security governance framework?
#152
Answer: A✅ Correct❌ Incorrect
What should be an information security manager's GREATEST concern when an HR department outsources data processing to a cloud service provider?
#153
Answer: D✅ Correct❌ Incorrect
Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?
#154
Answer: A✅ Correct❌ Incorrect
Which of the following BEST determines an information asset's classification?
#155
Answer: A✅ Correct❌ Incorrect
When an organization implements an information security governance framework, it is MOST important for executive leadership to have a direct role in:
#156
Answer: A✅ Correct❌ Incorrect
Which of the following should have the MOST influence on an organization's response to a new industry regulation?
#157
Answer: D✅ Correct❌ Incorrect
Biometrics are BEST used for:
#158
Answer: B✅ Correct❌ Incorrect
Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:
#159
Answer: B✅ Correct❌ Incorrect
Communicating which of the following would be MOST helpful to gain senior management support for risk treatment options?
#160
Answer: C✅ Correct❌ Incorrect
Which of the following is the BEST defense against distributed denial of service (DDoS) attacks?
#161
Answer: B✅ Correct❌ Incorrect
Which of the following scenarios would MOST likely require a change to corporate security policies?
#162
Answer: C✅ Correct❌ Incorrect
While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?
#163
Answer: D✅ Correct❌ Incorrect
When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?
#164
Answer: B✅ Correct❌ Incorrect
Which of the following should an information security manager do FIRST when a vulnerability has been disclosed?
#165
Answer: B✅ Correct❌ Incorrect
In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
#166
Answer: B✅ Correct❌ Incorrect
Which of the following is the BEST way to ensure the business continuity plan (BCP) is current?
#167
Answer: B✅ Correct❌ Incorrect
Which of the following would be MOST useful when determining the business continuity strategy for a large organization's data center?
#168
Answer: A✅ Correct❌ Incorrect
The results of a risk assessment for a potential network reconfiguration reveal a high likelihood of sensitive data being compromised. What is the information security manager's BEST course of action?
#169
Answer: C✅ Correct❌ Incorrect
Who should be included in INITIAL discussions regarding a failed security control?
#170
Answer: D✅ Correct❌ Incorrect
Which of the following is the MOST important outcome of a post-incident review?
#171
Answer: B✅ Correct❌ Incorrect
Which of the following is the BEST indicator of the performance of a security program?
#172
Answer: B✅ Correct❌ Incorrect
An organization has remediated a security flaw in a system. Which of the following should be done NEXT?
#173
Answer: C✅ Correct❌ Incorrect
Which of the following BEST facilitates the development of a comprehensive information security policy?
#174
Answer: A✅ Correct❌ Incorrect
Which of the following is the MOST effective way to demonstrate improvement in security performance?
#175
Answer: B✅ Correct❌ Incorrect
Capacity planning would prevent:
#176
Answer: C✅ Correct❌ Incorrect
Which of the following is the MOST effective way to ensure information security policies are understood?
#177
Answer: D✅ Correct❌ Incorrect
Which of the following is the MOST effective method for testing an incident response plan?
#178
Answer: C✅ Correct❌ Incorrect
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
#179
Answer: B✅ Correct❌ Incorrect
Which of the following is the MOST important reason for an organization to develop an information security governance program?