Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?
Prior to conducting a forensic examination, an information security manager should:
Which of the following is MOST important to ensure the alignment of an information security program with the organizational strategy?
Which of the following would provide the BEST evidence to senior management that security control performance has improved?
Which of the following is the MOST critical input to developing policies, standards, and procedures to secure information assets?
Of the following, who should be assigned as the owner of a newly identified risk related to an organization's new payroll system?
An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?
Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?
An information security manager learns that business unit leaders are encouraging increased use of social media platforms to reach customers. Which of the following should be done FIRST to help mitigate the risk of confidential information being disclosed by employees on social media?
A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?
Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?
Which of the following should be the PRIMARY objective of an information security governance framework?
An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?
Which of the following provides the MOST effective response against ransomware attacks?
An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:
How does an organization PRIMARILY benefit from the creation of an information security steering committee?
Which type of plan is PRIMARILY intended to reduce the potential impact of security events that may occur?
When implementing a security policy for an organization handling personally identifiable information (Pll); the MOST important objective should be:
Which of the following would be MOST useful when determining the business continuity strategy for a large organization's data center?
Which of the following is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?
Which of the following will ensure confidentiality of content when accessing an email system over the Internet?
An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?
Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?
Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?
Which of the following incident response phases involves actions to help safeguard critical systems while maintaining business operations?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?
Which of the following should be implemented to BEST reduce the likelihood of a security breach?
A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
What should be the FIRST step when an Internet of Things (loT) device in an organization's network is confirmed to have been hacked?
Which of the following is the MOST important consideration when determining which type of failover site to employ?
Which of the following should an information security manager do FIRST when a mandatory security standard hinders the achievement of an identified business objective?
Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?
Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?
Which of the following BEST prepares a computer incident response team for a variety of information security scenarios?
Senior management is concerned about data exposure through the use of public Al services. Which of the following is the information security manager's BEST course of action?
Which of the following is MOST important to include in monthly information security reports to the board?
Which of the following is MOST helpful for protecting an enterprise from advanced persistent threats (APTs)?
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
A global organization is planning to expand its operations into a new country with stricter data protection regulations than those in the headquarters' home country. Which of the following is the BEST approach for adopting these new requirements?
Which of the following is the BEST option to lower the cost to implement application security controls?
Which of the following is the BEST indication of a mature information security program?
Which of the following is MOST important in order to obtain senior leadership support when presenting an information security strategy?
Which of the following is the MOST important reason to conduct interviews as part of the business impact analysis (BIA) process?
Which of the following presents the GREATEST challenge to a security operations center's wna GY of potential security breaches?
Which of the following is MOST important to include in security incident escalation procedures?
Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?
Which of the following is MOST important to include in an information security strategy?
Which of the following BEST indicates that an information security governance framework has been successfully implemented?
An employee clicked on a link in a phishing email, triggering a ransomware attack Which of the following should be the information security?
An information security manager has been notified that two senior executives have the ability to elevate their own privileges in the corporate accounting system, in violation of policy. What is the FIRST step to address this issue?
Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
Which of the following MUST be defined in order for an information security manager to evaluate the appropriateness of controls currently in place?
If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:
Which of the following should be the PRIMARY outcome of an information security program?
Which of the following should an information security manager do FIRST when there is a conflict between the organization's information security policy and a local regulation?
A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?
Which of the following is the MOST effective way to demonstrate alignment of information security strategy with business objectives?
Which of the following is MOST important for the improvement of a business continuity plan (BCP)?
Which of the following is the BEST approach for managing user access permissions to ensure alignment with data classification?
Which of the following is the MOST critical consideration when shifting IT operations to an Infrastructure as a Service (laaS) model hosted in a foreign country?
An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?
An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?
The categorization of incidents is MOST important for evaluating which of the following?
A department has reported that a security control is no longer effective. Which of the following is the information security manager's BEST course of action?
A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?
Which of the following should be the PRIMARY basis for an information security strategy?
An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?
Which of the following is the PRIMARY reason for an information security manager to periodically review existing controls?
Which of the following should have the MOST influence on the development of information security policies?
When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:
What is the MOST important consideration for an organization operating in a highly regulated market when new regulatory requirements with high impact to the business need to be implemented?
Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?
Which of the following will BEST facilitate integrating the information security program into corporate governance?
Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?
Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?
Which of the following is the PRIMARY role of the information security manager in application development?
Which of the following should be an information security manager's FIRST course of action when a newly introduced privacy regulation affects the business?
An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?
An organization has identified a weakness in the ability of its employees to identify and report cybersecurity incidents. Although training materials have been provided, employees show a lack of interest. Which of the following is the information security manager’s BEST course of action?
Which of the following is the FIRST step to establishing an effective information security program?
Which of the following is the FIRST step in developing a business continuity plan (BCP)?
Which of the following is the PRIMARY reason for granting a security exception?
Which of the following has the GREATEST influence on an organization's information security strategy?
An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
Implementing the principle of least privilege PRIMARILY requires the identification of:
Which of the following BEST indicates that information security governance and corporate governance are integrated?
During which of the following development phases is it MOST challenging to implement security controls?
Which of the following is the PRIMARY reason to review the firewall logs when an external network-based attack is reported by the intrusion detection system (IDS)?
Which of the following should be the FIRST step when performing triage of a malware incident?
Which of the following is the MOST important criterion when deciding whether to accept residual risk?
Which type of system is MOST effective for prioritizing cyber incidents based on impact and tracking them until they are closed?
A business impact analysis (BIA) should be periodically executed PRIMARILY to:
Which of the following is MOST helpful in determining whether a phishing email is malicious?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?
Which of the following is the BEST way to obtain organization-wide support for an information security program?
An organization plans to implement a new e-commerce operation in a highly regulated market. Which of the following is MOST important to consider when updating the risk management strategy?
An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?
Which of the following should be done FIRST when developing a business continuity plan (BCP)?
Which of the following is the MOST important consideration when briefing executives about the current state of the information security program?
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
Which risk is introduced when using only sanitized data for the testing of applications?
If the investigation of an incident is not completed within the time allocated in the incident response plan, which of the following actions should be taken by the incident response team?
When choosing the best controls to mitigate risk to acceptable levels, the information security manager's decision should be MAINLY driven by:
Which of the following is the GREATEST benefit of information asset classification?
The PRIMARY objective of a post-incident review of an information security incident is to:
Which of the following is the MOST effective way to convey information security responsibilities across an organization?
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?
Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?
An organization's automated security monitoring tool generates an excessively large amount of falsq positives. Which of the following is the BEST method to optimize the monitoring process?
Which of the following is the MOST essential element of an information security program?
When developing a categorization method for security incidents, the categories MUST:
Identifying which of the following BEST enables a cyberattack to be contained?
Which of the following devices, when placed in a demilitarized zone (DMZ), would be considered the MOST significant exposure?
Which of the following BEST enables an incident response team to determine appropriate actions during an initial investigation?
Which of the following elements of a service contract would BEST enable an organization to monitor the information security risk associated with a cloud service provider?
An experienced information security manager joins a new organization and begins by conducting an audit of all key IT processes. Which of the following findings about the vulnerability management program should be of GREATEST concern?
Which of the following is the GREATEST benefit of performing a tabletop exercise of the business continuity plan (BCP)?
Which of the following BEST provides an information security manager with sufficient assurance that a service provider complies with the organization's information security requirements?
Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?
Security administration efforts will be greatly reduced following the deployment of which of the following techniques?
Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?
What is the role of the information security manager in finalizing contract negotiations with service providers?
Which of the following BEST indicates the organizational benefit of an information security solution?
Recommendations for enterprise investment in security technology should be PRIMARILY based on:
When investigating an information security incident, details of the incident should be shared:
Which of the following has the MOST influence on the inherent risk of an information asset?
An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?
An information security manager is updating the organization's incident response plan. Which of the following is the BEST way to validate that the process and procedures provided by IT and business units are complete, accurate, and known by all responsible teams?
While responding to a high-profile security incident, an information security manager observed several deficiencies in the current incident response plan. When would be the BEST time to update the plan?
Which of the following is the MOST effective way to detect security incidents?
Which of the following is the MOST likely reason for a vulnerability scanner to return incomplete results?
In a business proposal, a potential vendor promotes being certified for international security standards as a measure of its security capability.
Before relying on this certification, it is MOST important that the information security manager confirms that the:
Which of the following should be done NEXT following senior management's decision to comply with new personal data regulations that are much more stringent than those currently followed to avoid massive fines?
When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:
A global organization is considering its geopolitical security risks. Which of the following is the information security manager's BEST approach?
Which of the following is the MOST effective way to protect the authenticity of data in transit?
Which of the following events is MOST likely to require an organization to revisit its information security framework?
Which of the following is MOST important to include in an information security status report management?
Which of the following is the BEST reason for senior management to support a business case for developing a monitoring system for a critical application?
An employee of an organization has reported losing a smartphone that contains sensitive information The BEST step to address this situation is to:
Which of the following is the BEST way to obtain support for a new organization-wide information security program?
Which of the following activities MUST be performed by an information security manager for change requests?
Which of the following is MOST important for an information security manager to consider when reviewing a security investment plan?
An anomaly-based intrusion detection system (IDS) operates by gathering data on:
An organization recently outsourced the development of a mission-critical business application. Which of the following would be the BEST way to test for the existence of backdoors?
Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?
The PRIMARY reason for creating a business case when proposing an information security project is to:
An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?
An incident response plan is being developed for servers hosting sensitive information. In the event of a breach, who should make the decision to shut down the system?
Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?
Which of the following defines the triggers within a business continuity plan (BCP)? @
Which of the following should be triggered FIRST when unknown malware has infected an organization's critical system?
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?
Which of the following BEST enables an organization to provide ongoing assurance that legal and regulatory compliance requirements can be met?
When updating the information security policy to accommodate a new regulation, the information security manager should FIRST:
Which of the following will BEST facilitate timely and effective incident response?
The MOST important information for influencing management’s support of information security is:
When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?
Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?
Which of the following is MOST likely to reduce the effectiveness of a SIEM system?
When developing an information security strategy for an organization, which of the following is MOST helpful for understanding where to focus efforts?
A department has reported that a security control is no longer effective. Which of the following is the information security manager's BEST course of action?
An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?
Which of the following backup methods requires the MOST time to restore data for an application?
When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?
Which of the following is MOST important to ensure incident management readiness?
An organization has discovered that a server processing real-time visual data could be vulnerable to a lateral movement stage in a ransomware attack. Which of the following controls BEST mitigates this vulnerability?
A risk owner has accepted a large amount of risk due to the high cost of controls. Which of the following should be the information security manager's PRIMARY focus in this situation?
Who is BEST suited to determine how the information in a database should be classified?
An organization is aligning its incident response capability with a public cloud service provider. What should be the information security manager's FIRST course of action?
As part of incident response activities, the BEST time to begin the recovery process is after:
An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?
When management changes the enterprise business strategy which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?
An organization has been penalized by regulatory authorities for failing to notify them of a major security breach that may have compromised customer data. Which of the following is MOST likely in need of review and updating to prevent similar penalties in the future?
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?
Management has announced the acquisition of a new company. The information security manager of the parent company is concerned that conflicting access rights may cause critical information to be exposed during the integration of the two companies. To BEST address this concern, the information security manager should:
Which of the following activities is MOST appropriate to conduct during the eradication phase of a cyber incident response?
The department head of application development has decided to accept the risks identified in a recent assessment. No recommendations will be implemented, even though the recommendations are required by regulatory oversight. What should the information security manager do NEXT?
Which of the following BEST facilitates effective strategic alignment of security initiatives?
An information security manager has been asked to provide both one-year and five-year plans for the information security program. What is the PRIMARY purpose for the long-term plan?
Which of the following should be of GREATEST concern to an information security manager when evaluating a cloud service provider?
When creating an incident response plan, the PRIMARY benefit of establishing a clear definition of a security incident is that it helps to:
Which of the following BEST indicates that information assets are classified accurately?
An organization has acquired a new system with strict maintenance instructions and schedules. Where should this information be documented?
Of the following, who is BEST suited to own the risk discovered in an application?
An incident management team is alerted ta a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?
Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?
What is the PRIMARY benefit to an organization when information security program requirements are aligned with employment and staffing processes?
Which of the following would MOST effectively ensure that a new server is appropriately secured?
An organization's research department plans to apply machine learning algorithms on a large data set containing customer names and purchase history. The risk of personal data leakage is considered high impact. Which of the following is the BEST risk treatment option in this situation?
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
Which of the following should an information security manager do FIRST after learning through mass media of a data breach at the organization's hosted payroll service provider?
Which of the following should be updated FIRST to account for new regulatory requirements that impact current information security controls?
Which of the following sources is MOST useful when planning a business-aligned information security program?
Which of the following is the BEST method for determining whether a firewall has been configured to provide a comprehensive perimeter defense9
A global organization is developing an incident response team. The organization wants to keep headquarters informed of all incidents and wants to be able to present a unified response to widely dispersed events. Which of the following BEST supports these objectives?
While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?
A data loss prevention (DLP) tool has flagged personally identifiable information (Pll) during transmission. Which of the following should the information security manager do FIRST?
Which of the following is the MOST important consideration when defining control objectives?
Internal audit has reported a number of information security issues that are not in compliance with regulatory requirements. What should the information security manager do FIRST?
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?
Which of the following is the MOST important reason to consider organizational culture when developing an information security program?
A technical vulnerability assessment on a personnel information management server should be performed when:
Which of the following is MOST useful to an information security manager when determining the need to escalate an incident to senior?
Which of the following should be the MOST important consideration when reviewing an information security strategy?
Which or the following is MOST important to consider when determining backup frequency?
Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?
Which of the following should include contact information for representatives of equipment and software vendors?
Which of the following should be the MOST important consideration of business continuity management?
The BEST way to identify the risk associated with a social engineering attack is to:
To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?
Which of the following is the MOST important reason for obtaining input from risk owners when implementing controls?
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?
A new application has entered the production environment with deficient technical security controls. Which of the following is MOST Likely the root cause?
Which of the following is a PRIMARY responsibility of the information security goxernance function?
Which of the following metrics would provide an accurate measure of an information security program's performance?
Which of the following is the MOST important function of an information security steering committee?
An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?
Which of the following is the PRIMARY reason to conduct a post-incident review?
Which of the following BEST supports effective communication during information security incidents7
Which of the following is the MOST important reason for logging firewall activity?
Which of the following BEST facilitates the development of a comprehensive information security policy?
What is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?
Which of the following is a function of the information security steering committee?
Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?
Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of
confidentiality?
During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?
For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?
What should be an information security manager's MOST important consideration when developing a multi-year plan?
A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?
The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?
A multinational organization is introducing a security governance framework. The information security manager's concern is that regional security practices differ. Which of the following should be evaluated FIRST?
Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:
Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:
Application data integrity risk is MOST directly addressed by a design that includes:
Which of the following should be done FIRST when implementing a security program?
Following an employee security awareness training program, what should be the expected outcome?
A financial company executive is concerned about recently increasing cyberattacks and needs to take action to reduce risk. The organization would BEST respond by:
When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?
Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?
What should an information security manager do FIRST when an organization is planning to use a third-party cloud computing service for a critical business process?
Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?
Which of the following BEST determines the data retention strategy and subsequent policy for an organization?
Which of the following tasks would provide a newly appointed information security manager with the BEST view of the organization's existing security posture?
An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?
An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?
Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?