Loading questions...
Updated
Which of the following activities results in change requests?
Who is responsible for securing networks during a security incident?
The success of the Chief Information Security Officer is MOST dependent upon:
The PRIMARY objective of security awareness is to:
What should an organization do to ensure that they have a sound Business Continuity (BC) Plan?
Which of the following is MOST likely to be discretionary?
Many times a CISO may have to speak to the Board of Directors (BOD) about their cyber security posture.
What would be the BEST choice of security metrics to present to the BOD?
Creating a secondary authentication process for network access would be an example of?
Which of the following BEST describes an international standard framework that is based on the security model Information Technology-Code of Practice for
Information Security Management?
Which of the following has the GREATEST impact on the implementation of an information security governance model?
You are the Chief Information Security Officer of a large, multinational bank and you suspect there is a flaw in a two factor authentication token management process.
Which of the following represents your BEST course of action?
Which is the BEST solution to monitor, measure, and report changes to critical data in a system?
When dealing with Security Incident Response procedures, which of the following steps come FIRST when reacting to an incident?
A new CISO just started with a company and on the CISO's desk is the last complete Information Security Management audit report. The audit report is over two years old.
After reading it, what should be your first priority?
Which of the following set of processes is considered to be one of the cornerstone cycles of the International Organization for Standardization (ISO) 27001 standard?
When you develop your audit remediation plan what is the MOST important criteria?
What is the relationship between information protection and regulatory compliance?
A Chief Information Security Officer received a list of high, medium, and low impact audit findings.
Which of the following represents the BEST course of action?
An information security department is required to remediate system vulnerabilities when they are discovered. Please select the three primary remediation methods that can be used on an affected system.
Which represents PROPER separation of duties in the corporate environment?
Who in the organization determines access to information?
Step-by-step procedures to regain normalcy in the event of a major earthquake is PRIMARILY covered by which of the following plans?
An employee successfully avoids becoming a victim of a sophisticated spear phishing attack due to knowledge gained through the corporate information security awareness program.
What type of control has been effectively utilized?
When briefing senior management on the creation of a governance process, the MOST important aspect should be:
Which of the following is of MOST importance when security leaders of an organization are required to align security to influence the culture of an organization?