CISM Certified Information Security Manager Questions and Answers
Which of the following is necessary to ensure consistent protection for an organization's information assets?
Which of the following is the BEST indicator of the maturity level of a vendor risk management process?
After updating password standards, an information security manager is alerted by various application administrators that the applications they support are incapable of enforcing these standards. The information security manager's FIRST course of action should be to:
Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?
When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?
Reviewing which of the following would be MOST helpful when a new information security manager is developing an information security strategy for a non-regulated organization?
An information security manager has been tasked with developing materials to update the board, regulatory agencies, and the media about a security incident. Which of the following should the information security manager do FIRST?
Which of the following is the BEST indication ofa successful information security culture?
Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?
The BEST way to integrate information security governance with corporate governance is to ensure:
Which of the following would BEST guide the development and maintenance of an information security program?
Which of the following BEST facilitates the effectiveness of cybersecurity incident response?
Which of the following should be done FIRST after a ransomware incident has been successfully contained?
What type of control is being implemented when a security information and event management (SIEM) system is installed?
The ULTIMATE responsibility for ensuring the objectives of an information security framework are being met belongs to:
An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?
Which of the following is MOST important for an information security manager to consider when developing a business continuity plan (BCP) for ransomware attacks?
An organization uses a security standard that has undergone a major revision by the certifying authority. The old version of the standard will no longer be used for organizations wishing to maintain their certifications. Which of the following should be the FIRST
course of action?
To help users apply appropriate controls related to data privacy regulation, what is MOST important to communicate to the users?
Which of the following should include contact information for representatives of equipment and software vendors?
Which of the following is the MOST effective way to demonstrate improvement in security performance?
Which of the following is the PRIMARY purpose of a business impact analysis (BIA)?
Which of the following is the MOST important function of an information security steering committee?
Which of the following should be the MOST important consideration of business continuity management?
An organization learns that a third party has outsourced critical functions to another external provider. Which of the following is the information security manager's MOST important course of action?
An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?
Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?
Which of the following messages would be MOST effective in obtaining senior management's commitment to information security management?
Which of the following BEST helps to ensure the effective execution of an organization's disaster recovery plan (DRP)?
An organization has discovered that a server processing real-time visual data could be vulnerable to a lateral movement stage in a ransomware attack. Which of the following controls BEST mitigates this vulnerability?
Which of the following is the MOST effective way to protect the authenticity of data in transit?
What is the information security steering committee’s PRIMARY role in the development of security policies?
To overcome the perception that security is a hindrance to business activities, it is important for an information security manager to:
An incident management team is alerted ta a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:
Which of the following is the PRIMARY objective of information asset classification?
An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
Which of the following BEST minimizes information security risk in deploying applications to the production environment?
Senior management is concerned about data exposure through the use of public Al services. Which of the following is the information security manager's BEST course of action?
What is the BEST way to inform senior management of the value of information security?
Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?
Company A, a cloud service provider, is in the process of acquiring Company B to gain new benefits by incorporating their technologies within its cloud services.
Which of the following should be the PRIMARY focus of Company A's information security manager?
A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:
Which of the following would BEST support the business case for an increase in the information security budget?
Which of the following would be MOST helpful to identify worst-case disruption scenarios?
Which of the following is PRIMARILY influenced by a business impact analysis (BIA)?
Which of the following factors would have the MOST significant impact on an organization's information security governance mode?
In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
An information security manager has become aware that a third-party provider is not in compliance with the statement of work (SOW). Which of the following is the BEST course of action?
When establishing metrics for an information security program, the BEST approach is to identify indicators that:
Following an employee security awareness training program, what should be the expected outcome?
Which of the following is the MOST significant contributor to the success of incident response efforts during a major breach?
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?
Which of the following will ensure confidentiality of content when accessing an email system over the Internet?
An organization would like to invest in a new emerging technology. Which of the following is MOST important for the information security manager to consider when evaluating its impact?
Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?
Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?
Which of the following is MOST effective in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application?
Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?
Which of the following would BEST enable the timely execution of an incident response plan?
Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?
Which of the following would be of GREATEST assistance in determining whether to accept residual risk of a critical security system?
Which of the following is MOST important in increasing the effectiveness of incident responders?
An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization's critical systems?
Which of the following would be the BEST way to reduce the risk of disruption resulting from an emergency system change?
A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager's FIRST step in addressing the issue should be to:
Which of the following would BEST enable the help desk to recognize an information security incident?
Which type of system is MOST effective for prioritizing cyber incidents based on impact and tracking them until they are closed?
To ensure the information security of outsourced IT services, which of the following is the MOST critical due diligence activity?
Which of the following provides the MOST effective response against ransomware attacks?
An organization has identified IT failures in a call center application. Of the following, who should own this risk?
An organization's information security manager reads on social media that a recently purchased vendor product has been compromised and customer data has been posted online. What should the information security manager do FIRST?
Which of the following BEST enables an organization to operate smoothly with reduced capacities when service has been disrupted?
Which of the following should an information security manager do FIRST when noncompliance with security standards is identified?
When integrating security risk management into an organization it is MOST important to ensure:
Which of the following is MOST important to consider when defining control objectives?
Which of the following defines the triggers within a business continuity plan (BCP)? @
During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?
Which of the following is MOST helpful for aligning security operations with the IT governance framework?
Which of the following should be the FIRST step when performing triage of a malware incident?
An incident response team has established that an application has been breached. Which of the following should be done NEXT?
Which of the following should be an information security manager's FIRST course of action when a newly introduced privacy regulation affects the business?
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
Senior management wants to thoroughly test a disaster recovery plan (DRP) for a mission-critical system. Which of the following would provide the MOST reliable results?
An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?
A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?
Which of the following should be the PRIMARY focus of a status report on the information security program to senior management?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?
The PRIMARY reason for creating a business case when proposing an information security project is to:
Which of the following is the GREATEST challenge when developing key risk indicators (KRIs)?
While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
Management of a financial institution accepted an operational risk that consequently led to the temporary deactivation to a critical monitoring process. Which of the following should be the information security manager's GREATEST concern with this situation?
What should an information security manager do FIRST when an organization is planning to use a third-party cloud computing service for a critical business process?
Which of the following should be an information security manager's PRIMARY concern when an organization is expanding business to a new country?
Which of the following presents the GREATEST challenge when assessing the impact of emerging risk?
Which of the following is the BEST indication of an effective disaster recovery planning process?
Which of the following is the MOST important requirement for a successful security program?
Which of the following should be done FIRST when establishing a new data protection program that must comply with applicable data privacy regulations?
Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?
Which of the following should be the PRIMARY focus of an organization with immature incident detection capabilities?
Which of the following is MOST helpful in determining the criticality of an organization's business functions?
Which of the following should be done FIRST when developing a business continuity plan (BCP)?
An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:
• A bad actor broke into a business-critical FTP server by brute forcing an administrative password
• The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
• The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
• After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail
Which of the following could have been prevented by conducting regular incident response testing?
Which of the following is the BEST method for determining whether new risks exist in legacy systems?
Which of the following should be an information security manager's FIRST course of action when a potential business breach is discovered in a critical business system?
Which of the following provides the BEST evidence that a newly implemented security awareness program has been effective?
Which of the following should be of GREATEST concern to an information security manager when evaluating a cloud service provider?
A global organization is planning to expand its operations into a new country with stricter data protection regulations than those in the headquarters' home country. Which of the following is the BEST approach for adopting these new requirements?
Which of the following BEST enables the integration of information security governance into corporate governance?
An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?
Of the following, who is BEST suited to own the risk discovered in an application?
Which of the following BEST supports effective communication during information security incidents7
What is the PRIMARY benefit to an organization when information security program requirements are aligned with employment and staffing processes?
Of the following, who is BEST positioned to be accountable for risk acceptance decisions based on risk appetite?
An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
Which of the following should be the PRIMARY basis for a severity hierarchy for information security incident classification?
Which of the following should be the PRIMARY consideration when developing an incident response plan?
An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?
Identifying which of the following BEST enables a cyberattack to be contained?
An organization is implementing an information security governance framework. To communicate the program's effectiveness to stakeholders, it is MOST important to establish:
Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?
Which type of recovery site is MOST reliable and can support stringent recovery requirements?
Which of the following desired outcomes BEST supports a decision to invest in a new security initiative?
When management changes the enterprise business strategy which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?
An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?
Which of the following is the BEST approach to make strategic information security decisions?
Which of the following is MOST important to the successful implementation of an information security program?
Which of the following is MOST important when defining how an information security budget should be allocated?
Which of the following is the BEST approach to incident response for an organization migrating to a cloud-based solution?
Which of the following is an information security manager's BEST recommendation to senior management following a breach at the organization's Software as a Service (SaaS) vendor?
Which of the following is a PRIMARY responsibility of the information security goxernance function?
Which of the following is the BEST source of information to support an organization's information security vision and strategy?
Which of the following presents the GREATEST risk associated with the use of an automated security information and event management (SIEM) system?
Which of the following is MOST important when developing an information security strategy?
Prior to implementing a bring your own device (BYOD) program, it is MOST important to:
Which of the following would MOST effectively ensure that a new server is appropriately secured?
An internal audit has revealed that a number of information assets have been inappropriately classified. To correct the classifications, the remediation accountability should be assigned to:
The categorization of incidents is MOST important for evaluating which of the following?
After the occurrence of a major information security incident, which of the following will BEST help an information security manager determine corrective actions?
Which of the following is the BEST tool to monitor the effectiveness of information security governance?
Which of the following is MOST helpful in the development of a cost-effective information security strategy that is aligned with business requirements?
Which of the following provides the MOST comprehensive understanding of an organization's information security posture?
When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?
Which of the following is MOST important for building 4 robust information security culture within an organization?
Which of the following is the MOST critical factor for information security program success?
An organization has recently purchased cybersecurity insurance after the board voiced concern about the potential for a security breach. With this response to the perceived risk, the organization:
Which of the following is the BEST way to ensure data is not co-mingled or exposed when using a cloud service provider?
An organization's information security team presented the risk register at a recent information security steering committee meeting. Which of the following should be of MOST concern to the committee?
Which of the following is the MOST important security consideration when planning to use a cloud service provider in a different country?
Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?
Which of the following is the BEST option to lower the cost to implement application security controls?
The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness training program is to include:
Who is BEST positioned to take ownership of critical IT security risks identified in an application?
An organization wants to integrate information security into its HR management processes. Which of the following should be the FIRST step?
Which of the following would BEST help to ensure appropriate security controls are built into software?
Which of the following is MOST important to consider when aligning a security awareness program with the organization's business strategy?
Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?
The effectiveness of an information security governance framework will BEST be enhanced if:
Of the following, who is BEST positioned to approve specific information security risk treatment options?
An organization engages a third-party vendor to monitor and support a financial application under scrutiny by regulators. Which of the following controls would MOST effectively manage risk to the organization?
Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?
The MOST important reason for having an information security manager serve on the change management committee is to:
Which of the following is the MOST effective way to increase security awareness in an organization?
An information security manager is concerned with continued security policy violations in a particular business unit despite recent efforts to rectify the situation. What is the BEST course of action?
A recent audit found that an organization's new user accounts are not set up uniformly. Which of the following is MOST important for the information security manager to review?
During which of the following development phases is it MOST challenging to implement security controls?
Which of the following is MOST important for an information security manager to verify when selecting a third-party forensics provider?
Which of the following is the BEST indicator of an organization's information security status?
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
Which of the following is established during the preparation phase of an incident response plan?
Which of the following is the BEST indication of an effective information security program?
An anomaly-based intrusion detection system (IDS) operates by gathering data on:
Which of the following should have the MOST influence on an organization's response to a new industry regulation?
Which of the following is the FIRST step when conducting a post-incident review?
Application data integrity risk is MOST directly addressed by a design that includes:
Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?
Management has announced the acquisition of a new company. The information security manager of the parent company is concerned that conflicting access rights may cause critical information to be exposed during the integration of the two companies. To BEST address this concern, the information security manager should:
Which of the following is the PRIMARY responsibility of the information security function when an organization adopts emerging technologies?
Network isolation techniques are immediately implemented after a security breach to:
An incident response team has been assembled from a group of experienced individuals, Which type of exercise would be MOST beneficial for the team at the first drill?
An information security team has started work to mitigate findings from a recent penetration test. Which of the following presents the GREATEST risk to the organization?
When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security manager should be to ensure:
An information security manager has discovered a new technique that cybercriminals are exploiting. Which of the following has the manager identified?
Which of the following should an information security manager do FIRST when a vulnerability has been disclosed?
Which of the following will BEST enable an organization to meet incident response requirements when outsourcing its incident response function?
In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
An employee clicked on a malicious link in an email that resulted in compromising company data. What is the BEST way to mitigate this risk in the future?
Which of the following would be MOST useful to help senior management understand the status of information security compliance?
Which of the following is the MOST important reason to document information security incidents that are reported across the organization?
A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?
Which of the following would BEST address the risk of a system failing to detect a breach?
Which of the following BEST indicates the effectiveness of the vendor risk management process?
Which of the following metrics would provide an accurate measure of an information security program's performance?
Which of the following is MOST important to convey to employees in building a security risk-aware culture?
Following a risk assessment, an organization has made the decision to adopt a bring your own device (BYOD) strategy. What should the information security manager do NEXT?
An organization is experiencing a sharp increase in incidents related to phishing messages. The root cause is an outdated email filtering system that is no longer supported by the vendor. Which of the following should be the information security manager's FIRST course of action?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
Which of the following is MOST important to emphasize when presenting information to gain senior management support for control enhancements?
An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?
To help ensure that an information security training program is MOST effective its contents should be
The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:
Which of the following BEST indicates that an information security governance framework has been successfully implemented?
Which of the following BEST enables an organization to identify and contain security incidents?
Which of the following BEST enables an information security manager to demonstrate the effectiveness of the information security and risk program to senior management?
An organization has been penalized by regulatory authorities for failing to notify them of a major security breach that may have compromised customer data. Which of the following is MOST likely in need of review and updating to prevent similar penalties in the future?
Which of the following incident response phases involves actions to help safeguard critical systems while maintaining business operations?
Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?
To inform a risk treatment decision, which of the following should the information security manager compare with the organization's risk appetite?
Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?
Which of the following business units should own the data that populates an identity management system?
Which of the following has the MOST influence on the information security investment process?
Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?
The executive management of a domestic organization has announced plans to expand operations to multiple international locations. Which of the following should be the information security manager's FIRST step upon learning of these plans?
An information security manager is working to incorporate media communication procedures into the security incident communication plan. It would be MOST important to include:
Which of the following BEST enables an information security manager to obtain organizational support for the implementation of security controls?
Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?
Which of the following eradication methods is MOST appropriate when responding to an incident resulting in malware on an application server?
Which of the following is the MOST important consideration when establishing an organization's information security governance committee?
Which of the following BEST helps to enable the desired information security culture within an organization?
Which of the following is the MOST effective way to address an organizations security concerns during contract negotiations with a third party?
Which of the following is the PRIMARY reason to conduct a post-incident review?
An organization is planning to engage a third-party service provider to develop custom software. Which of the following would help to provide the GREATEST assurance of software security?
Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?
Which of the following is a prerequisite for formulating a business continuity plan (BCP)?
Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?
A risk owner has accepted a large amount of risk due to the high cost of controls. Which of the following should be the information security manager's PRIMARY focus in this situation?
An organization needs to comply with new security incident response requirements. Which of the following should the information security manager do FIRST?
Which of the following should be done NEXT following senior management's decision to comply with new personal data regulations that are much more stringent than those currently followed to avoid massive fines?
A proposal designed to gain buy-in from senior management for a new security project will be MOST effective if it includes:
Which of the following BEST enables an organization to determine the costs of downtime for a critical application?
Which of the following should be given the HIGHEST priority during an information security post-incident review?
Which of the following should be done FIRST once a cybersecurity attack has been confirmed?
Which of the following is MOST important to ensure the alignment of an information security program with the organizational strategy?
Which of the following is MOST important to include in an incident response plan to ensure incidents are responded to by the appropriate individuals?
Which of the following BEST indicates that information assets are classified accurately?
An online bank identifies a successful network attack in progress. The bank should FIRST:
Which of the following is CRITICAL to ensure the appropriate stakeholder makes decisions during a cybersecurity incident?
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
The information security manager of a multinational organization has been asked to consolidate the information security policies of its regional locations. Which of the following would be of
GREATEST concern?
Which type of plan is PRIMARILY intended to reduce the potential impact of security events that may occur?
Which of the following tasks would provide a newly appointed information security manager with the BEST view of the organization's existing security posture?
Which of the following BEST helps to ensure risk appetite is considered during the risk treatment process?
An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?
Which of the following is the BEST course of action when an information security manager identifies that systems are vulnerable to emerging threats?
Which of the following is MOST important to include in an information security status report to senior management?
Which of the following is the PRIMARY purpose of implementing information security standards?
Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?
Which of the following is the FIRST step in developing a business continuity plan (BCP)?
Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?
An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification for granting an exception to the policy?
Which of the following provides the MOST useful information for identifying security control gaps on an application server?
A department has reported that a security control is no longer effective. Which of the following is the information security manager's BEST course of action?
Which of the following should an information security manager do FIRST after identifying suspicious activity on a PC that is not in the organization's IT asset inventory?
Which of the following should be the KEY consideration when creating an information security communication plan with industry peers?
Which of the following BEST determines the data retention strategy and subsequent policy for an organization?
Which of the following presents the GREATEST challenge to a large multinational organization using an automated identity and access management (1AM) system?
The department head of application development has decided to accept the risks identified in a recent assessment. No recommendations will be implemented, even though the recommendations are required by regulatory oversight. What should the information security manager do NEXT?
Management has expressed concerns to the information security manager that shadow IT may be a risk to the organization. What is the FIRST step the information security manager should take?
Which of the following is the MOST important reason for an organization to communicate to affected parties that a security incident has occurred?
An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?
When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:
When establishing classifications of security incidents for the development of an incident response plan, which of the following provides the MOST valuable input?
Which of the following elements of a service contract would BEST enable an organization to monitor the information security risk associated with a cloud service provider?
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:
Data entry functions for a web-based application have been outsourced to a third-party service provider who will work from a remote site Which of the following issues would be of GREATEST concern to an information security manager?
When taking a risk-based approach to vulnerability management, which of the following is MOST important to consider when prioritizing a vulnerability?
For the information security manager, integrating the various assurance functions of an organization is important PRIMARILY to enable:
Which of the following is MOST important to ensure incident management readiness?
Which of the following BEST determines the allocation of resources during a security incident response?
Which of the following will BEST facilitate timely and effective incident response?
When developing a categorization method for security incidents, the categories MUST:
Which of the following is the MOST important reason for an information security manager to archive and retain the organization's electronic communication and email data?
Meeting which of the following security objectives BEST ensures that information is protected against unauthorized disclosure?
Management would like to understand the risk associated with engaging an Infrastructure-as-a-Service (laaS) provider compared to hosting internally. Which of the following would provide the BEST method of comparing risk scenarios?
Which of the following activities is MOST appropriate to conduct during the eradication phase of a cyber incident response?
Which of the following would be the MOST effective way to present quarterly reports to the board on the status of the information security program?