<< Prev Question Next Question >>

Question 81/250

The value of information assets relative to the organization is BEST determined by:

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (250q)
Question 1: The integration of information security risk management proc...
Question 2: Which of the following metrics would be considered an accura...
Question 3: Which of the following is the BEST evidence that information...
Question 4: Which of the following is the MOST significant benefit of ef...
Question 5: To ensure IT equipment meets organizational security standar...
Question 6: An organization plans to implement a document collaboration ...
Question 7: An information security manager learns of a new internationa...
Question 8: In an organization where IT is critical to its business stra...
Question 9: Which of the following provides the BEST input to maintain a...
Question 10: Which of the following is MOST useful to include in a report...
Question 11: Which of the following should be PRIMARILY included in a sec...
Question 12: During the establishment of a service level agreement (SLA) ...
Question 13: Knowing which of the following is MOST important when the in...
Question 14: Which of the following is the BEST strategy to implement an ...
Question 15: Which of the following is the MOST important reason for logg...
Question 16: Which of the following is MOST relevant for an information s...
Question 17: Which of the following methods BEST ensures that a comprehen...
Question 18: Which of the following would provide the BEST justification ...
Question 19: Which of the following should be the PRIMARY consideration f...
Question 20: Which of the following is the PRIMARY reason to invoke conti...
Question 21: Which of the following practices BEST supports the achieveme...
Question 22: Which of the following is the PRIMARY goal of a risk managem...
Question 23: Which of the following is the PRIMARY benefit of using agent...
Question 24: Exceptions to a security policy should be approved based PRI...
Question 25: Which of the following is MOST important to include in an in...
Question 26: A hacking group has posted an organization's employee data o...
Question 27: Which of the following should be the MOST important criteria...
Question 28: What should an information security manager do NEXT when man...
Question 29: An inexperienced information security manager is relying on ...
Question 30: An information security manager is developing a new informat...
Question 31: To integrate security into system development fie cycle (SDL...
Question 32: What should the information security manager do FIRST when e...
Question 33: Which of the following would present the GREATEST challenge ...
Question 34: Which of the following would be MOST effective when justifyi...
Question 35: Which of the following presents the GREATEST concern to the ...
Question 36: Several significant risks have been identified after a centr...
Question 37: For a user of commercial software downloaded from the Intern...
Question 38: Which of the following is MOST important for an information ...
Question 39: Which of the following is the MOST important requirement for...
Question 40: Which of the following is the PRIMARY benefit to an organiza...
Question 41: A data leakage prevention (DLP) solution has identified that...
Question 42: Which of the following is the MOST important prerequisite to...
Question 43: Which of the following is the MOST effective way to ensure t...
Question 44: Which of the following would be the BEST way for a company 1...
Question 45: Which of the following is the BEST way for an information se...
Question 46: A risk has been formally accepted and documented. Which of t...
Question 47: Which of the following is MOST likely to result from a prope...
Question 48: The MOST important reason for an information security manage...
Question 49: Which of the following is MOST important for an information ...
Question 50: Which of the following is the KEY outcome of conducting a po...
Question 51: The PRIMARY purpose of a risk assessment is to enable busine...
Question 52: Following a highly sensitive data breach at a large company,...
Question 53: Which of the following is the MOST important reason for perf...
Question 54: When preparing a business case for the implementation of a s...
Question 55: Which of the following metrics BEST evaluates the completene...
Question 56: Which of the following is the MOST effective way to achieve ...
Question 57: Which of the following control type is the FIRST considerati...
Question 58: Which of the following is the MOST important consideration w...
Question 59: An information security manager has researched several optio...
Question 60: Adding security requirements late in the software developmen...
Question 61: To address the issue that performance pressures on IT may co...
Question 62: Due lo budget constraints, an internal IT application does n...
Question 63: The BEST way to ensure information security efforts and init...
Question 64: An organization recently rolled out a new procurement progra...
Question 65: A newly hired information security manager discovers that th...
Question 66: Which of the following devices, when placed in a demilitariz...
Question 67: Which of the following is MOST important when selecting a th...
Question 68: An organization is considering a self-service solution for t...
Question 69: Information security governance is PRIMARILY driven by which...
1 commentQuestion 70: Which of the following is BEST determined by using technical...
Question 71: An organization has detected sensitive data leakage caused b...
Question 72: The GREATEST benefit of choosing a private cloud over a publ...
Question 73: When considering whether to adopt a new information security...
Question 74: When facilitating the alignment of corporate governance and ...
Question 75: The frequency of conducting business impact analysis (BIA) s...
Question 76: An organization has implemented an enhanced password policy ...
Question 77: Which of the following should be define* I FIRST when creati...
Question 78: Which of the following is the MOST effective way to mitigate...
Question 79: Which of the following is the MOST important element of a re...
Question 80: Which of the following is the MOST appropriate board-level a...
Question 81: The value of information assets relative to the organization...
Question 82: Which of the following is a PRIMARY responsibility of an inf...
Question 83: Which of the following is the BEST way to improve the timely...
Question 84: The use of a business case to obtain funding for an informat...
Question 85: What is the MOST important consideration when establishing m...
Question 86: The PRIMARY focus of a training curriculum for members of an...
Question 87: Which of the following is a PRIMARY objective of incident cl...
Question 88: Business units within an organization are resistant to propo...
Question 89: Which of the following is a PRIMARY security responsibility ...
Question 90: A policy has been established requiting users to install mob...
Question 91: Which of the following should be reviewed to obtain a struct...
Question 92: Which of the following is MOST helpful when justifying the f...
Question 93: Which of the following should be used to attain sustainable ...
Question 94: In an organization implementing a data classification progra...
Question 95: An organization involved in e-commerce activities operating ...
Question 96: An information security manager s PRIMARY objective for pres...
Question 97: Which of the following would provide the MOST useful input w...
Question 98: When developing a protection strategy for outsourcing applic...
Question 99: Which of the following is the GREATEST risk to consider when...
Question 100: The MOST effective control to detect fraud inside an organiz...
Question 101: Which of the following is MOST important to the successful i...
Question 102: Which of the following is the MOST effective way to ensure s...
Question 103: BEST way to isolate corporate data stored on employee-owned ...
Question 104: Risk identification, analysis, and mitigation activities can...
Question 105: An information security manager is reviewing the organizatio...
Question 106: Which of the following approaches is BEST for selecting cont...
Question 107: During the restoration of several servers, a critical proces...
Question 108: Which of the following BEST supports the risk assessment pro...
Question 109: An organization us&amp; a particular encryption protocol for...
Question 110: Which of the following should be the PRIMARY input when defi...
Question 111: An information security manager is developing evidence prese...
Question 112: Which of the following is the GREATEST risk of single sign-o...
Question 113: When the inherent risk of a business activity is lower than ...
Question 114: Which of the following is the PRIMARY objective of the incid...
Question 115: Which of the following is MOST critical for prioritizing act...
Question 116: A potential security breach has been reported to an organiza...
Question 117: Which of the following BEST demonstrates that an organizatio...
Question 118: Which of the following is the MOST important function of inf...
Question 119: Which of the following should be the PRIMARY consideration w...
Question 120: Which of the following is the FlRST step to promoting accept...
Question 121: Which of the following MOST effectively prevents internal us...
Question 122: Which of the following is the MOST important consideration o...
Question 123: Web application firewalls are needed in addition to other in...
Question 124: Which of the following is the PRIMARY purpose for establishi...
Question 125: What is the PRIMARY purpose of communicating business impact...
Question 126: An organization wants to integrate information security into...
Question 127: An organization has recently experienced unauthorized device...
Question 128: When information security management is receiving an increas...
Question 129: The PRIMARY benefit of integrating information security acti...
Question 130: Which of the following provides the BEST justification for a...
Question 131: An employee is found to be using an external cloud storage s...
Question 132: Which of the following should be done FIRST when implementin...
Question 133: An organization with a maturing incident response program co...
Question 134: The MOST important factors in determining the scope and timi...
Question 135: Which of the following metrics is the BEST indicator of an a...
Question 136: Which of the following is the PRIMARY reason for performing ...
Question 137: Which of the following is the BEST method to ensure that dat...
Question 138: Which of the following is the BEST reason to develop compreh...
Question 139: Which is MOST important when contracting an external party t...
Question 140: The BEST way to determine the current state of information s...
Question 141: Within a security governance framework, which of the followi...
Question 142: Which of the following is an indicator of improvement in the...
Question 143: The head of a department affected by a recent security incid...
Question 144: An organization is the victim of a targeted attack, and is u...
Question 145: Which of the following is the MOST important consideration w...
Question 146: Which of the following is the MOST effective way to mitigate...
Question 147: When integrating information security requirements into soft...
Question 148: Which of the following is MOST important for an information ...
Question 149: After undertaking a security assessment of a production syst...
Question 150: Which of the following is the PRIMARY reason to conduct peri...
Question 151: Which of the following is the MOST important consideration f...
Question 152: Meeting which of the following security objectives BEST ensu...
Question 153: Which of the following is the MOST important element of an e...
Question 154: Reviewing security objectives and ensuring the integration o...
Question 155: For proper escalation of events, it is MOST important for th...
Question 156: Which of the following is the MOST effective way for senior ...
Question 157: Which of the following is the MOST important consideration w...
Question 158: The PRIMARY goal of a security infrastructure design is the:...
Question 159: Which of the following is the MOST important outcome of seni...
Question 160: An information security manager learns that a departmental s...
Question 161: The PRIMARY advantage of a network intrusion detection syste...
Question 162: The PRIMARY reason an organization would require that users ...
Question 163: What should be the PRIMARY objective of conducting interview...
Question 164: An information security manager has been asked to identify p...
Question 165: An information security manager is concerned that executive ...
Question 166: When trying to integrate information security across an orga...
Question 167: Ensuring that an organization can conduct security reviews w...
Question 168: The PRIMARY reason for classifying assets is to:...
Question 169: An organization is considering a self-service solution for t...
Question 170: When using a newly implemented security information and even...
Question 171: Which of the following enables compliance with a nonrepudiat...
Question 172: When preparing a disaster recovery plan, which of the follow...
Question 173: Which of the following is the MOST useful input for an infor...
Question 174: Inadvertent disclosure of internal business information on s...
Question 175: A company has purchased a rival organization and is looking ...
Question 176: An organization's information security manager will find it ...
Question 177: An information security manager determines there are a signi...
Question 178: Which of the following is MOST effective against system intr...
Question 179: An organization establishes an internal document collaborati...
Question 180: Which of the following is the BEST way to ensure the effecti...
Question 181: Which of the following is the PRIMARY advantage of having an...
Question 182: An access rights review revealed that some former employees'...
Question 183: Which of the following BEST indicates that information secur...
Question 184: Which of the following provides the MOST comprehensive under...
Question 185: Planning for the implementation of an information security p...
Question 186: Which of the following should be the PRIMARY expectation of ...
Question 187: After implementing an information security governance framew...
Question 188: An information security manager is evaluating the key risk i...
Question 189: Which of the following is the BEST evidence that proper secu...
Question 190: Which of the following is the MOST important reason for perf...
Question 191: Which of the following is MOST important to building an effe...
Question 192: Which of the following is MOST important to the successful d...
Question 193: Which of the following is the BEST reason for delaying the a...
Question 194: Which of the following will BEST provide an organization wit...
Question 195: What should be information security manager's FIRST course o...
Question 196: A new organization has been hit with a ransomware attack tha...
Question 197: A third-party service provider has proposed a data loss prev...
Question 198: During an annual security review of an organizations servers...
Question 199: Which of the following needs to be established between an IT...
Question 200: A multinational organization has developed a bring your own ...
Question 201: Which of the following would BEST enable management to be aw...
Question 202: Authorization can BEST be accomplished by establishing:...
Question 203: A security incident has resulted in a failure of the enterpr...
Question 204: A multinational organization wants to ensure its privacy pro...
Question 205: Which of the following BEST enables an effective escalation ...
Question 206: Relying on which of the following methods when detecting new...
Question 207: An organization's marketing department has requested access ...
Question 208: Which of the following provides the BEST preparation for han...
Question 209: The BEST way to identify the criticality of systems to the b...
Question 210: An organization's security policy is to disable access to US...
Question 211: Which is MOST important to enable a timely response to a sec...
Question 212: The GREATEST benefit of using a maturity model when providin...
Question 213: Which of the following is the BEST approach to identify nonc...
Question 214: Which of the following provides the MOST relevant evidence o...
Question 215: In an organization with effective IT risk management, the PR...
Question 216: Which of the following would be an information security mana...
Question 217: Which of the following would BEST help to ensure an organiza...
Question 218: Which of the following should an information security manage...
Question 219: To integrate security into system development life cycle (SD...
Question 220: In a risk assessment after the identification of threats to ...
Question 221: Establishing which of the following is the BEST way of ensur...
Question 222: Which of the following is the MOST beneficial outcome of tes...
Question 223: Which of the following is the STRONGEST indication that seni...
Question 224: An organization has experienced a ransomware attack. Which o...
Question 225: Which of the following would present the GREATEST need to re...
Question 226: Senior management has decided to accept a significant risk w...
Question 227: Which of the following is the BEST approach for determining ...
Question 228: Which of the following is the BEST way to prevent employees ...
Question 229: Which of the following is the MOST important outcome of test...
Question 230: Which of the following is the BEST way for an information se...
Question 231: What should be an organization's. MAIN concern when evaluati...
Question 232: Which type of test is MOST effective in communicating the ro...
Question 233: When making an outsourcing decision, which of the following ...
Question 234: An information security manager is planning to purchase a mo...
Question 235: For an organization with a large and complex IT infrastructu...
Question 236: The BEST way to improve the effectiveness of responding to a...
Question 237: In a resource-restricted security program, which of the foll...
Question 238: Which of the following has the GREATEST impact on efforts to...
Question 239: After a risk has been mitigated, which of the following is t...
Question 240: When developing security standards, which of the following w...
Question 241: Which of the following is the PRIMARY goal of an incident re...
Question 242: Which of the following is the MOST important reason to docum...
Question 243: Which of the following would BEST detect malicious damage ar...
Question 244: The PRIMARY objective of periodically testing an incident re...
Question 245: When selecting risk response options to manage risk, an info...
Question 246: Which of the following is the MOST effective approach of del...
Question 247: Which of the following is MOST important for an information ...
Question 248: A business unit has requested IT to implement simple authent...
Question 249: Which of the following would BEST enhance firewall security?...
Question 250: In a large organization, which of the following is the BEST ...