Loading questions...
Updated
Which of the following would BEST enable effective decision-making?
Which of the following is the BEST option to lower the cost to implement application security controls?
Which of the following is the GREATEST benefit of effective information security governance?
The ability to integrate information security governance into corporate governance is PRIMARILY driven by:
Which of the following presents the GREATEST challenge for protecting Internet of Things (IoT) devices?
Which of the following parameters is MOST helpful when designing a disaster recovery strategy?
An IT service desk was not adequately prepared for a recent ransomware attack on user workstations. Which of the following should be given HIGHEST priority by the information security team when creating an action plan to improve service desk readiness?
After a risk has been identified, analyzed, and evaluated, which of the following should be done NEXT?
Which of the following will BEST facilitate timely and effective incident response?
Which of the following MOST effectively communicates the current risk profile to senior management after controls are applied?
Which of the following processes should be done NEXT after completing a business impact analysis (BIA)?
Which of the following has the GREATEST impact on efforts to improve an organization's security posture?
Which of the following is MOST important to include in an information security policy?
Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?
Which of the following would be the MOST effective use of findings from a post-incident review?
During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?
Which of the following is MOST helpful in determining the realization of benefits from an information security program?
During an internal compliance review, the review team discovers that a critical legacy application is unable to meet the organization's mandatory security requirements. Which of the following should be done FIRST?
Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?
Of the following, who would provide the MOST relevant input when aligning the information security strategy with organizational goals?
Which of the following is the PRIMARY role of the information security manager in application development?
Which of the following actions by senior management would BEST enable a successful implementation of an information security governance framework?
Which of the following is the BEST strategy to implement an effective operational security posture?
An information security risk analysis BEST assists an organization in ensuring that:
Which of the following is the MOST effective way to address an organization's security concerns during contract negotiations with a third party?