Network isolation techniques are immediately implemented after a security breach to:
Meeting which of the following security objectives BEST ensures that information is protected against unauthorized disclosure?
Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?
Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?
An organization has purchased an Internet sales company to extend the sales department. The information security manager's FIRST step to ensure the security policy framework encompasses the new business model is to:
When taking a risk-based approach to vulnerability management, which of the following is MOST important to consider when prioritizing a vulnerability?
When creating an incident response plan, the PRIMARY benefit of establishing a clear definition of a security incident is that it helps to:
Which of the following is the MOST important reason to consider organizational culture when developing an information security program?
An information security team is planning a security assessment of an existing vendor. Which of the following approaches is MOST helpful for properly scoping the assessment?
Which of the following is MOST difficult to measure following an information security breach?
An organization would like to invest in a new emerging technology. Which of the following is MOST important for the information security manager to consider when evaluating its impact?
An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
The PRIMARY advantage of involving end users in continuity planning is that they:
What is the MOST important consideration for an organization operating in a highly regulated market when new regulatory requirements with high impact to the business need to be implemented?
An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?
Which of the following should be updated FIRST to account for new regulatory requirements that impact current information security controls?
An organization is considering the feasibility of implementing a big data solution to analyze customer data. In order to support this initiative, the information security manager should FIRST:
Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?
Which of the following defines the triggers within a business continuity plan (BCP)? @
Which of the following should be given the HIGHEST priority during an information security post-incident review?
Which of the following will BEST facilitate the integration of information security governance into enterprise governance?
To prepare for a third-party forensics investigation following an incident involving malware, the incident response team should:
What should be an information security manager's MOST important consideration when developing a multi-year plan?
Which of the following is the MOST appropriate metric to demonstrate the effectiveness of information security controls to senior management?
Which of the following is the BEST technical defense against unauthorized access to a corporate network through social engineering?
Which of the following is MOST important to consider when defining control objectives?
An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?
An incident response plan is being developed for servers hosting sensitive information. In the event of a breach, who should make the decision to shut down the system?
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
After the occurrence of a major information security incident, which of the following will BEST help an information security manager determine corrective actions?
Which of the following should be the MOST important consideration when establishing information security policies for an organization?
An organization uses a security standard that has undergone a major revision by the certifying authority. The old version of the standard will no longer be used for organizations wishing to maintain their certifications. Which of the following should be the FIRST
course of action?
Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?
The PRIMARY goal of the eradication phase in an incident response process is to:
Which of the following metrics BEST demonstrates the effectiveness of an organization's security awareness program?
An information security policy was amended recently to support an organization's new information security strategy. Which of the following should be the information security manager's NEXT step?
Which of the following should be an information security manager's PRIMARY concern when an organization is expanding business to a new country?
ACISO learns that a third-party service provider did not notify the organization of a data breach that affected the service provider's data center. Which of the following should the CISO do FIRST?
Which of the following will have the GREATEST influence on the successful adoption of an information security governance program?
An organization is MOST likely to accept the risk of noncompliance with a new regulatory requirement when:
Which of the following is the PRIMARY reason to regularly update business continuity and disaster recovery documents?
When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:
Which of the following would BEST ensure that security is integrated during application development?
How would the information security program BEST support the adoption of emerging technologies?
Who is BEST suited to determine how the information in a database should be classified?
Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?
A financial company executive is concerned about recently increasing cyberattacks and needs to take action to reduce risk. The organization would BEST respond by:
Which of the following should be implemented to BEST reduce the likelihood of a security breach?
During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
An organization that conducts business globally is planning to utilize a third-party service provider to process payroll information. Which of the following issues poses the GREATEST risk to the organization?
Which of the following is MOST important to include in security incident escalation procedures?
To improve the efficiency of the development of a new software application, security requirements should be defined:
Which of the following should be an information security manager's FIRST course of action when a newly introduced privacy regulation affects the business?
Which of the following components of an information security risk assessment is MOST valuable to senior management?
What should be the NEXT course of action when an information security manager has identified a department that is repeatedly not following the security policy?
Which of the following BEST facilitates the reporting of useful information about the effectiveness of the information security program?
Which of the following is the PRIMARY benefit of implementing an information security governance framework?
An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?
To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:
If the investigation of an incident is not completed within the time allocated in the incident response plan, which of the following actions should be taken by the incident response team?
Which of the following is the BEST starting point for a newly hired information security manager who has been tasked with identifying and addressing network vulnerabilities?
Which of the following would BEST help to ensure appropriate security controls are built into software?
An online trading company discovers that a network attack has penetrated the firewall. What should be the information security manager's FIRST response?
Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?
Which of the following is the MOST effective way to identify changes in an information security environment?
Which of the following is MOST effective in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application?
A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?
Which of the following will BEST enable an organization to meet incident response requirements when outsourcing its incident response function?
Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?
A department has reported that a security control is no longer effective. Which of the following is the information security manager's BEST course of action?
An information security manager is working to incorporate media communication procedures into the security incident communication plan. It would be MOST important to include:
Which of the following BEST determines the data retention strategy and subsequent policy for an organization?
Which of the following BEST indicates the effectiveness of the vendor risk management process?
An employee clicked on a link in a phishing email, triggering a ransomware attack Which of the following should be the information security?
An organization plans to leverage popular social network platforms to promote its products and services. Which of the following is the BEST course of action for the information security manager to support this initiative?
A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?
Which of the following is MOST critical when creating an incident response plan?
Which of the following roles is MOST appropriate to determine access rights for specific users of an application?
An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
Which of the following tasks would provide a newly appointed information security manager with the BEST view of the organization's existing security posture?
Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of
confidentiality?
When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?
Which of the following is the MOST effective way to protect the authenticity of data in transit?
Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?
Which of the following should be of GREATEST concern regarding an organization's security controls?
In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?
The MOST important reason for having an information security manager serve on the change management committee is to:
Which of the following events is MOST likely to require an organization to revisit its information security framework?
A business impact analysis (BIA) should be periodically executed PRIMARILY to:
An organization is leveraging tablets to replace desktop computers shared by shift-based staff These tablets contain critical business data and are inherently at increased risk of theft Which of the following will BEST help to mitigate this risk''
Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?
Prior to conducting a forensic examination, an information security manager should:
Which of the following is the MOST important consideration when updating procedures for managing security devices?
What is the MOST important consideration when establishing metrics for reporting to the information security strategy committee?
Which of the following is MOST important when defining how an information security budget should be allocated?
An organization has decided to implement an Internet of Things (IoT) solution to remain competitive in the market. Which of the following should information security do FIRST?
Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?
Which of the following is MOST helpful in determining the criticality of an organization's business functions?
Which of the following BEST enables an organization to maintain legally admissible evidence7
In addition to executive sponsorship and business alignment, which of the following is MOST critical for information security governance?
An organization's information security manager reads on social media that a recently purchased vendor product has been compromised and customer data has been posted online. What should the information security manager do FIRST?
Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?
Which of the following is the MOST important consideration when determining which type of failover site to employ?
Which of the following eradication methods is MOST appropriate when responding to an incident resulting in malware on an application server?
Which of the following BEST enables staff acceptance of information security policies?
Which of the following is the BEST reason to implement a comprehensive information security management system?
To ensure continuous alignment with the organizational strategy
To gain senior management support for the information security program
To support identification of key risk indicators (KRIs)
During which of the following development phases is it MOST challenging to implement security controls?
Which of the following is the GREATEST value provided by a security information and event management (SIEM) system?
Which of the following is the BEST course of action when using a web application that has known vulnerabilities?
Senior management is concerned about data exposure through the use of public Al services. Which of the following is the information security manager's BEST course of action?
Which of the following is the MOST important reason for an information security manager to archive and retain the organization's electronic communication and email data?
Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?
Which of the following is the GREATEST benefit of performing a tabletop exercise of the business continuity plan (BCP)?
Management decisions concerning information security investments will be MOST effective when they are based on:
When drafting the corporate privacy statement for a public website, which of the following MUST be included?
Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?
Which of the following is MOST important to have in place for an organization's information security program to be effective?
Which of the following would provide the BEST input to a business case for a technical solution to address potential system vulnerabilities?
The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?
While responding to a high-profile security incident, an information security manager observed several deficiencies in the current incident response plan. When would be the BEST time to update the plan?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
Which of the following business units should own the data that populates an identity management system?
An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?
Which of the following is MOST helpful for determining which information security policies should be implemented by an organization?
Which of the following is the PRIMARY preventive method to mitigate risks associated with privileged accounts?
Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?
Which of the following is the MOST effective way to increase security awareness in an organization?
Which of the following is the MOST important detail to capture in an organization's risk register?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:
An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?
Which of the following would be MOST useful when determining the business continuity strategy for a large organization's data center?
Which of the following provides an information security manager with the MOST accurate indication of the organization's ability to respond to a cyber attack?
An information security program is BEST positioned for success when it is closely aligned with:
Which of the following would be MOST important to include in a proposal justifying investments for an organization's information security program?
Which of the following is MOST relevant for an information security manager to communicate to the board of directors?
Which of the following should an organization do FIRST when confronted with the transfer of personal data across borders?
Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?
Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?
An incident handler is preparing a forensic image of a hard drive. Which of the following MUST be done to provide evidence that the image is an exact copy of the original?
The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?
A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:
Which of the following is a PRIMARY function of an incident response team?
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
A security incident has been reported within an organization. When should an information security manager contact the information owner?
Which of the following is the PRIMARY role of an information security manager in a software development project?
Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its cloud services.
Which of the following should be the PRIMARY focus of Company A's information security manager?
When deciding to move to a cloud-based model, the FIRST consideration should be:
Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
Which of the following is MOST important in increasing the effectiveness of incident responders?
Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?
Which of the following is the GREATEST challenge with assessing emerging risk in an organization?
Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?
An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
Which of the following is an information security manager's BEST course of action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?
An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?
Which of the following will ensure confidentiality of content when accessing an email system over the Internet?
A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?
An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?
Which of the following is the BEST indication of effective information security governance?
Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
During which phase of an incident response plan is the root cause determined?
An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:
• A bad actor broke into a business-critical FTP server by brute forcing an administrative password
• The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
• The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
• After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail
Which of the following could have been prevented by conducting regular incident response testing?
Which of the following has the MOST influence on the inherent risk of an information asset?
Which type of plan is PRIMARILY intended to reduce the potential impact of security events that may occur?
An organization engages a third-party vendor to monitor and support a financial application under scrutiny by regulators. Which of the following controls would MOST effectively manage risk to the organization?
Which of the following should be done FIRST to prioritize response to incidents?
Which of the following is MOST appropriate to communicate to senior management regarding information risk?
Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?
An organization is increasingly using Software as a Service (SaaS) to replace in-house hosting and support of IT applications. Which of the following would be the MOST effective way to help ensure procurement decisions consider information security concerns?
An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?
Which of the following is the MOST important outcome of effective risk treatment?
Which of the following is the PRIMARY objective of testing security controls within a critical infrastructure?
An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?
For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?
Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?
Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?
Which of the following is the MOST common cause of cybersecurity breaches?
Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?
Which of the following should be done FIRST when developing a business continuity plan (BCP)?
Implementing the principle of least privilege PRIMARILY requires the identification of:
A recent application security assessment identified a number of low- and medium-level vulnerabilities. Which of the following stakeholders is responsible for deciding the appropriate risk treatment option?
Due to specific application requirements, a project team has been granted administrative ponieon GR: is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to these users?
Which of the following BEST demonstrates that an anti-phishing campaign is effective?
An organization is performing due diligence when selecting a third party. Which of the following is MOST helpful to reduce the risk of unauthorized sharing of information during this process?
Which of the following parties should be responsible for determining access levels to an application that processes client information?
Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?
Which of the following BEST protects against emerging advanced persistent threat (APT) actors?
Which of the following would provide the BEST evidence to senior management that security control performance has improved?
An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?
Which of the following would BEST enable the timely execution of an incident response plan?
The MAIN benefit of implementing a data loss prevention (DLP) solution is to:
An organization has identified a weakness in the ability of its employees to identify and report cybersecurity incidents. Although training materials have been provided, employees show a lack of interest. Which of the following is the information security manager’s BEST course of action?
Which of the following is the MOST effective way to influence organizational culture to align with security guidelines?
When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?
Which of the following BEST supports information security management in the event of organizational changes in security personnel?
Which of the following is an example of a change to the external threat landscape?
The use of a business case to obtain funding for an information security investment is MOST effective when the business case:
A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?
An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.
Which of the following should be given immediate focus?
An organization has suffered from a large-scale security event impacting a critical system. Following the decision to restore the system at an alternate location, which plan should be invoked?
An organization is planning to outsource network management to a service provider. Including which of the following in the contract would be the MOST effective way to mitigate information security risk?
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
An organization is experiencing a sharp increase in incidents related to phishing messages. The root cause is an outdated email filtering system that is no longer supported by the vendor. Which of the following should be the information security manager's FIRST course of action?
An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:
Identifying which of the following BEST enables a cyberattack to be contained?
The MOST important element in achieving executive commitment to an information security governance program is:
An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?
Which of the following should an information security manager do FIRST after a new cybersecunty regulation has been introduced?
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
What should an information security manager verify FIRST when reviewing an information asset management program?
Which of the following is MOST important in order to obtain senior leadership support when presenting an information security strategy?
Which of the following is the PRIMARY role of the information security manager in application development?
A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?
Which of the following provides the BEST evidence that a newly implemented security awareness program has been effective?
Which of the following BEST indicates that information security governance and corporate governance are integrated?
Which of the following Is MOST useful to an information security manager when conducting a post-incident review of an attack?
From a business perspective, the GREATEST benefit of an incident response plan is that it:
Which of the following should an information security manager do FIRST after identifying suspicious activity on a PC that is not in the organization's IT asset inventory?
Which of the following is the BEST method to ensure compliance with password standards?
Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?
For an e-business that requires high availability, which of the following design principles is BEST?
Which of the following processes BEST supports the evaluation of incident response effectiveness?
In which cloud model does the cloud service buyer assume the MOST security responsibility?
An information security manager has confirmed the organization's cloud provider has unintentionally published some of the organization's business data. Which of the following should be done NEXT?
A project team member notifies the information security manager of a potential security risk that has not been included in the risk register. Which of the following should the information security manager do FIRST?
Which of the following is the BEST way to ensure data is not co-mingled or exposed when using a cloud service provider?
Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?
Which of the following is MOST important for the information security manager to include when presenting changes in the security risk profile to senior management?
Which of the following is the BEST indicator of a successful intrusion into an organization's systems?
A recent audit found that an organization's new user accounts are not set up uniformly. Which of the following is MOST important for the information security manager to review?
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?
Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?
Which of the following BEST supports investments in an information security program?
Which of the following is the MOST critical consideration when shifting IT operations to an Infrastructure as a Service (laaS) model hosted in a foreign country?
Which of the following is the MOST important factor in an organization's selection of a key risk indicator (KRI)?
How does an organization PRIMARILY benefit from the creation of an information security steering committee?
Which of the following is the MOST important consideration when establishing an organization's information security governance committee?
Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?
Which of the following BEST helps to ensure the effective execution of an organization's disaster recovery plan (DRP)?
An organization's disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?
Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?
Which of the following is MOST important for an information security manager to consider when developing a business continuity plan (BCP) for ransomware attacks?
Which of the following is the PRIMARY reason for an information security manager to periodically review existing controls?
Which of the following is the MOST important reason for logging firewall activity?
To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:
Which of the following is the FIRST step in developing a business continuity plan (BCP)?
A risk assessment exercise has identified the threat of a denial of service (DoS) attack Executive management has decided to take no further action related to this risk. The MO ST likely reason for this decision is
Which of the following should be the PRIMARY focus for an information security manager when reviewing access controls for data stored in an off-premise cloud environment?
Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?
Which of the following should an information security manager do FIRST when a vulnerability has been disclosed?
Which of the following is MOST important to include in an information security status report to senior management?
Which of the following is the BEST approach for governing noncompliance with security requirements?
Which risk is introduced when using only sanitized data for the testing of applications?
An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?
Which of the following is the BEST strategy when determining an organization's approach to risk treatment?
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
When developing an incident escalation process, the BEST approach is to classify incidents based on:
Which of the following is MOST effective for communicating forward-looking trends within security reporting?