<< Prev Question Next Question >>

Question 491/565

Which of the following is MOST important for the alignment of an information security program with the information security strategy?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (565q)
1 commentQuestion 1: Which of the following will BEST provide an organization wit...
Question 2: An organization finds unauthorized software has been install...
Question 3: An organization is concerned with the potential for exploita...
Question 4: Which of the following is the GREATEST benefit of integratin...
Question 5: Which of the following is the MOST effective method for cate...
Question 6: In a large organization, defining recovery time objectives (...
Question 7: Inadvertent disclosure of internal business information on s...
1 commentQuestion 8: Which of the following is the MOST important security consid...
Question 9: An information security manager has researched several optio...
Question 10: Which of the following is the MOST effective method for asse...
Question 11: To address the issue that performance pressures on IT may co...
Question 12: An organization planning to contract with a cloud service pr...
Question 13: After assessing risk, the decision to treat the risk should ...
Question 14: In a risk assessment after the identification of threats to ...
Question 15: Which of the following would BEST help to ensure the alignme...
Question 16: Which of the following is MOST helpful for prioritizing the ...
Question 17: Which of the following is the PRIMARY purpose of red team te...
Question 18: An information security manager has discovered a potential s...
Question 19: The PRIMARY objective for using threat modeling in web appli...
Question 20: In an organization where IT is critical to its business stra...
Question 21: Which of the following is the BEST way to address risk assoc...
Question 22: The BEST way of establish a security baseline is by document...
Question 23: Which of the following is the MOST effective way to detect s...
Question 24: A business unit has updated its long-term business plan to i...
Question 25: Which of the following techniques is MOST useful when an inc...
Question 26: What is the BEST course of action when an Information securi...
Question 27: An information security manager learns that a departmental s...
Question 28: An organization is considering moving to a cloud service pro...
Question 29: An organization's marketing department has requested access ...
Question 30: An information security manager is implementing controls to ...
Question 31: A hash algorithm is used to:
Question 32: What information is MOST helpful in demonstrating to senior ...
Question 33: Which of the following approaches would MOST likely ensure t...
1 commentQuestion 34: Which of the following MOST effectively allows for disaster ...
Question 35: Which of the following is the BEST way to prevent recurrence...
Question 36: Which of the following is MOST important for an information ...
Question 37: Exceptions to a security policy should be approved based PRI...
Question 38: Which of the following is the GREATEST benefit of a comprehe...
Question 39: When developing an incident response plan, the information s...
Question 40: Which of the following activities MUST be performed by an in...
Question 41: Which of the following is the BEST course of action if the b...
Question 42: The PRIMARY purpose of a periodic threat and risk assessment...
Question 43: Which of the following will provide the MOST accurate test r...
Question 44: The authorization to transfer the handling of an internal se...
Question 45: After adopting an information security framework, an informa...
Question 46: Priore implementing a bring your own device (BYOD) program, ...
Question 47: An information security manager notes that security incident...
Question 48: Which of the following is the MOST important step in risk ra...
Question 49: An organization has experienced multiple instances of privil...
Question 50: An organization is planning to open a new office in another ...
Question 51: Which of the following metrics is the BEST measure of the ef...
Question 52: Which of the following BEST enables a more efficient inciden...
Question 53: Which of the following BEST supports effective information s...
Question 54: Which of the following is MOST useful to include in a report...
Question 55: Which of the following should be the FIRST step to ensure sy...
Question 56: An information security manager is preparing a presentation ...
Question 57: What should an information security team do FIRST when notif...
Question 58: When developing a protection strategy for outsourcing applic...
Question 59: Which of the following is the MOST important reason for perf...
Question 60: Which of the following is the BEST strategy to implement an ...
Question 61: Which of the following BEST indicates the value a purchased ...
Question 62: The PRIMARY advantage of a network intrusion detection syste...
Question 63: Which of the following should an information security manage...
Question 64: The PRIMARY purpose of aligning information security with co...
Question 65: When establishing classifications of security incidents for ...
Question 66: Which of the following is BEST performed by the security dep...
Question 67: Which of the following BEST indicates that an information se...
Question 68: A CEO requires that information security risk management is ...
Question 69: What should the information security manager do FIRST when e...
Question 70: Which of the following metrics would be considered an accura...
Question 71: Which of the following is the BEST method to protect against...
Question 72: Which of the following external entities would provide the B...
Question 73: Which of the following components of an information security...
Question 74: A team developing an interface to a key financial system has...
Question 75: When making an outsourcing decision, which of the following ...
Question 76: The BEST way to report to the board on the effectiveness of ...
Question 77: A recent audit has identified that security controls require...
Question 78: The MOST useful technique for maintaining management support...
Question 79: Which of the following processes would BEST aid an informati...
Question 80: What should an information security manager do FIRST after a...
Question 81: When developing a tabletop test plan for incident response t...
Question 82: A significant gap in an organization's breach containment pr...
Question 83: Which of the following tasks should be performed once a disa...
Question 84: Which of the following has the MOST direct impact on the usa...
Question 85: Risk reporting requirements should be PRIMARILY based on:...
Question 86: What should be the PRIMARY basis for establishing a recovery...
Question 87: Which of the following is MOST important to the effectivenes...
Question 88: A business manager has decided not to implement a control ba...
Question 89: To gain a clear understanding of the impact that a new regul...
Question 90: Which of the following processes can be used to remediate id...
Question 91: Which of the following metrics is the BEST indicator of an a...
Question 92: Which of the following is the BEST reason for delaying the a...
Question 93: Which of the following is MOST helpful when justifying the f...
Question 94: Which of the following is the MOST reliable source of inform...
Question 95: Which of the following would be MOST useful in a report to s...
Question 96: From a business perspective the MOST important function of i...
Question 97: The PRIMARY disadvantage of using a cold-site recovery facil...
Question 98: Which of the following is the BEST indicator to demonstrate ...
Question 99: Which of the following provides the BEST evidence that the i...
Question 100: Which of the following is the PRIMARY objective of defining ...
Question 101: An organization is developing a disaster recover/ plan for a...
Question 102: Which of the following is the BEST way to ensure that Incide...
Question 103: Which of the following is the MOST effective control to redu...
Question 104: Which of the following is MOST relevant for an information s...
Question 105: A company is considering a new automated system that require...
Question 106: What should be the PRIMARY basis for defining the appropriat...
Question 107: Which of the following will MOST effectively minimize the ch...
Question 108: Which of the following roles is BEST suited to validate user...
Question 109: The PRIMARY role of an information security steering group i...
Question 110: Which of the following is the BEST way to determine if an or...
Question 111: Which aspect of an incident response plan will MOST effectiv...
1 commentQuestion 112: Which of the following BEST demonstrates return on investmen...
Question 113: Which of the following is a PRIMARY function of an incident ...
Question 114: Which of the following is the MOST effective way for an Info...
Question 115: An organization manages payroll and accounting systems for m...
Question 116: The PRIMARY purpose for defining key risk indicators (KRIs) ...
Question 117: What is the role of the information security manager in fina...
Question 118: Which of the following incident response team (IRT) models i...
Question 119: Which of the following BEST prepares a computer incident res...
Question 120: Which of the following is the MOST effective way for an orga...
Question 121: Which of the following messages would be MOST effective in o...
Question 122: An organization s senior management is encouraging employees...
Question 123: Which of the following should provide the PRIMARY basis for ...
Question 124: An organization is concerned with the risk of information le...
Question 125: An application system stores customer confidential data and ...
Question 126: Which of the following defines the triggers within a busines...
Question 127: In an organization that has undergone an expansion through a...
Question 128: Which of the following is the MOST important security consid...
Question 129: With limited resources in the information security departmen...
Question 130: Management decisions concerning information security investm...
Question 131: Which of the following is the MOST important reason for an o...
Question 132: In a multinational organization, local security regulations ...
Question 133: An organization was forced to pay a ransom to regain access ...
Question 134: What is the PRIMARY role of the information security program...
Question 135: What is the PRIMARY purpose of communicating business impact...
Question 136: An organization engages 4 third-party vendor to monitor and ...
Question 137: Which of the following is an information security manager's ...
Question 138: Which of the following is the MOST effective method of preve...
Question 139: Which of the following is the PRIMARY reason to include mess...
Question 140: Which of the following is the BEST way to ensure the effecti...
Question 141: Which of the following is MOST helpful in determining the pr...
Question 142: Which of the following would be MOST helpful to identify sec...
Question 143: An internal control audit has revealed a control deficiency ...
Question 144: During an emergency security incident, which of the followin...
Question 145: When is the BEST time to identify the potential regulatory r...
Question 146: What is the PRIMARY benefit of effective configuration manag...
Question 147: When evaluating vendors for sensitive data processing, which...
Question 148: When implementing security architecture, an information secu...
Question 149: Which of the following should be the PRIMARY factor in prior...
Question 150: An information security manager is reviewing the organizatio...
Question 151: What is the PRIMARY objective of triage within the incident ...
Question 152: What is the MOST important consideration when establishing m...
Question 153: Noncompliance issues were identified through audit. Which of...
Question 154: The MOST important factors in determining the scope and timi...
Question 155: Which of the following provides the BEST opportunity to eval...
Question 156: An incident was detected where customer records were altered...
Question 157: Which of the following should provide the PRIMARY justificat...
Question 158: Which of the following should be the MOST important consider...
Question 159: Which of the following is the MOST critical security risk to...
Question 160: An information security manager has been tasked with impleme...
Question 161: Which of the following security controls should be integrate...
Question 162: Which of the following is the GREATEST benefit of integratin...
Question 163: Ensuring that an organization can conduct security reviews w...
Question 164: An organization has decided to conduct a postmortem analysis...
Question 165: An organization s HR department would like to outsource its ...
Question 166: What should be an information security manager's MOST import...
Question 167: An emergency change was made to an IT system as a result of ...
Question 168: In a cloud technology environment, which of the following wo...
Question 169: Which of the following is the MOST challenging aspect of sec...
Question 170: Which of the following is the responsibility of a data owner...
Question 171: The PRIMARY objective of periodically testing an incident re...
Question 172: Which of the following is the PRIMARY responsibility of an i...
Question 173: A business unit manager wants to adopt an emerging technolog...
Question 174: The PRIMARY reason an organization would require that users ...
Question 175: An organization Is storing accounting data in an external cl...
Question 176: In addition to business alignment and security ownership, wh...
Question 177: For an enterprise implementing a bring your own device (BYOD...
Question 178: Which of the following is the MOST important factor of a suc...
Question 179: Which of the following is the MOST important outcome of moni...
Question 180: An information security manager has become aware that a thir...
Question 181: Which of the following metrics would provide management with...
Question 182: Within a security governance framework, which of the followi...
Question 183: Which of the following is the BEST way to integrate informat...
Question 184: An attacker was able to gain access to an organizations peri...
Question 185: A new mobile application is unable to adhere to the organiza...
Question 186: What is the BEST way for an information security manager to ...
Question 187: During the restoration of several servers, a critical proces...
Question 188: The MOST important reason that security risk assessments sho...
Question 189: For an organization that provides web-based services, which ...
Question 190: Which of the following provides the MOST useful information ...
Question 191: Which of the following should be done FIRST when establishin...
Question 192: A third-party service provider is developing a mobile app fo...
Question 193: Which of the following is MOST likely to increase end user s...
Question 194: Which of the following is the MOST effective method to preve...
Question 195: For an organization with a large and complex IT infrastructu...
Question 196: An organization has detected potential risk emerging from no...
Question 197: An organization is implementing an information security gove...
Question 198: An organization's operations have been significantly impacte...
Question 199: Which of the following would provide the MOST helpful inform...
Question 200: The PRIMARY purpose of establishing an information security ...
Question 201: Which of the following outsourced services has the GREATEST ...
Question 202: Which of the following is the BEST indication that the infor...
Question 203: Which of the following is MOST effective against system intr...
Question 204: Which of the following should be the GREATEST concern when c...
Question 205: Which of the following is the BEST way for an information se...
Question 206: An organization is automating data protection by implementin...
Question 207: Which of the following will ensure confidentiality of conten...
Question 208: Which of the following is MOST likely to be included in an e...
Question 209: Which of the following provides the BEST evidence that a con...
Question 210: Which of the following is the BEST way for an Information se...
Question 211: When recommending a preventive control against cross-site sc...
Question 212: Which of the following would provide the BEST input to a bus...
Question 213: Which of the following is the BEST advantage of a centralize...
Question 214: Conflicting objectives are MOST likely to compromise the eff...
Question 215: Which of the following would BEST mitigate identified vulner...
Question 216: Which of the following BEST demonstrates alignment between i...
Question 217: While conducting a test of a business continuity plan (BCP)....
Question 218: Which of the following is the PRIMARY reason to avoid alerti...
Question 219: The PRIMARY responsibility to communicate with legal authori...
Question 220: An organization must meet rigorous breach reporting standard...
Question 221: Which of the following would MOST effectively help to restri...
Question 222: When supporting an organization's privacy officer, which of ...
Question 223: Which of the following provides the GREATEST assurance that ...
Question 224: The PRIMARY benefit of a centralized time server ts that it...
Question 225: Which of the following should be an information security man...
Question 226: Who is MOST important to include when establishing the respo...
Question 227: Fingerprint biometrics are BEST used for:...
Question 228: To ensure adequate disaster-preparedness among IT infrastruc...
Question 229: Which of the following is the BEST reason to reassess risk f...
Question 230: The BEST way for an information security manager to understa...
Question 231: Which of the following BEST demonstrates the performance of ...
Question 232: Which of the following is the BEST way to measure the effect...
Question 233: An employee is found to be using an external cloud storage s...
Question 234: An online payment provider's computer security incident resp...
Question 235: When establishing the trigger levels for an organization's k...
Question 236: A senior executive asks the information security manager to ...
Question 237: Senior management has approved employees working off-site by...
Question 238: The MAIN consideration when designing an incident escalation...
Question 239: An information security manager has noticed a large number o...
Question 240: Which of the following is the MOST likely outcome from the i...
Question 241: Which of the following is the STRONGEST indication that seni...
Question 242: Which of the following would be MOST helpful when determinin...
Question 243: Which of the following is the BEST way for an information se...
Question 244: Over the last year, an information security manager has perf...
Question 245: Which of the following is an information security manager's ...
Question 246: The PRIMARY goal of a security infrastructure design is the:...
Question 247: Which of the following is the MOST important factor to be co...
Question 248: An information security program should be established PRIMAR...
Question 249: Which of the following BEST enables effective information se...
Question 250: Which of the following provides the MOST relevant evidence o...
Question 251: The MAIN objective of identifying and evaluating risk at eac...
Question 252: The GREATEST advantage of defining multiple types of system ...
Question 253: An information security manager is concerned that executive ...
Question 254: The fundamental purpose of establishing security metrics is ...
Question 255: Which of the following should an information security manage...
Question 256: A newly appointed information security manager has been aske...
Question 257: Which of the following is MOST important to present to stake...
Question 258: What should an information security manager do NEXT when man...
Question 259: Which of the following is the GREATEST risk to consider when...
Question 260: Which of the following would be the MOST effective incident ...
Question 261: Which of the following should an information security manage...
Question 262: What should be an organization's. MAIN concern when evaluati...
Question 263: A risk management program will be MOST effective when:...
Question 264: Which of the following is the BEST way to reduce the risk of...
Question 265: Which of the following is MOST important to ensure when cons...
Question 266: Which of the following should be part of the final phase of ...
Question 267: What should the information security manager recommend to su...
Question 268: In information security governance, the PRIMARY role of the ...
Question 269: A multinational organization wants to ensure its privacy pro...
Question 270: Which of the following is the MOST appropriate board-level a...
Question 271: Which of the following is the BEST way to ensure that organi...
Question 272: Which of the following is the MOST relevant information to i...
Question 273: Planning for the implementation of an information security p...
Question 274: Which of the following should be an information security man...
Question 275: Which of the following is the MOST useful input for an infor...
Question 276: Which of the following is MOST relevant for an information s...
Question 277: Which of the following is MOST important for guiding the dev...
Question 278: Which of the following BEST enables new third-party supplier...
Question 279: Which type of control is an incident response team?...
Question 280: Which of the following is the MOST significant advantage of ...
Question 281: Which of the following is MOST important to help ensure an i...
Question 282: Which of the following is the MAIN concern when securing eme...
Question 283: Management has expressed concerns to the information securit...
Question 284: An organization has acquired a company in a foreign country ...
Question 285: Which of the following would MOST effectively communicate th...
Question 286: An information security manager has developed a strategy to ...
Question 287: Which of the following is the BEST way for an information se...
Question 288: An organization has recently experienced unauthorized device...
Question 289: The MAIN reason for an information security manager to monit...
Question 290: Which of the following is the MOST important reason for an o...
Question 291: Which is the MOST important driver for effectively communica...
Question 292: Which of the following would BEST help to ensure an organiza...
Question 293: To minimize the business impact from information security in...
Question 294: Which of the following is the PRIMARY purpose of conducting ...
Question 295: Which of the following is the MOST effective way to motivate...
Question 296: Which of the following will BEST enhance the privacy of data...
Question 297: Which of the following should an information security manage...
Question 298: When preventative controls to appropriately mitigate risk ar...
Question 299: The MOST important objective of monitoring key risk indicato...
Question 300: A third-party service provider has proposed a data loss prev...
Question 301: Who should have PRIMARY responsibility for authorizing acces...
Question 302: During the due diligence phase of an acquisition, the MOST i...
Question 303: An information security manager has discovered that a busine...
Question 304: Which of the following BEST describes an intrusion detection...
Question 305: For which of the following is it MOST important that system ...
1 commentQuestion 306: Which of the following is an example of a deterrent control?...
Question 307: An employee used network logon credentials on a personal sho...
Question 308: Which of the following is MOST important to have in place to...
Question 309: During a new user provisioning process, who should have PRIM...
Question 310: Which of the following is the MOST important consideration w...
Question 311: Which of the following would be the BEST way for a company t...
Question 312: Which of the following is the FIRST task when determining an...
Question 313: When considering whether to adopt bring your own device (BYO...
Question 314: Which of the following is MOST critical for responding effec...
Question 315: To gain a clear+ understanding of the impact that a new regu...
Question 316: Which of the following is the BEST method for determining wh...
Question 317: Which of the following is the MOST important consideration i...
Question 318: Which of the following is MOST important to consider when de...
Question 319: The PRIMARY reason for defining the information security rol...
Question 320: An employee clicked on a link in a phishing email, triggerin...
Question 321: A new regulatory requirement affecting an organization's inf...
Question 322: What should be the information security manager s MOST impor...
Question 323: A risk assessment report shows that phishing attacks are an ...
Question 324: When integrating information security requirements into soft...
Question 325: In an organization with a rapidly changing environment, busi...
Question 326: Which of the following is the MOST important outcome from vu...
Question 327: Which of the following is MOST important to consider when de...
Question 328: Which of the following is the FIRST step when defining and p...
Question 329: Within the confidentiality, integrity, and availability (CIA...
Question 330: Which of the following will BEST protect an organization aga...
Question 331: Which of the following is the BEST reason to initiate a reas...
Question 332: Which of the following is the MOST effective way to mitigate...
Question 333: Which of the following BEST supports the incident management...
Question 334: Which of the following is MOST important for an information ...
Question 335: Which of the following is a benefit of using key risk indica...
Question 336: As part of an international expansion plan, an organization ...
Question 337: Which of the following is the BEST method to ensure complian...
Question 338: When developing an incident response plan, which of the foll...
Question 339: The GREATEST benefit resulting from well-documented informat...
Question 340: Which is the BEST way for an organization to monitor securit...
Question 341: In the development of an information security strategy, reco...
Question 342: Which of the following is the MOST important outcome of a we...
Question 343: Which of the following BEST demonstrates that an organizatio...
Question 344: An organization has contracted with an outsourcing company t...
Question 345: When developing a new application, which of the following is...
Question 346: Which of the following is MOST important to include in a con...
Question 347: Which of the following is MOST important to ensuring an inci...
Question 348: Which of the following is the MOST effective approach for de...
Question 349: A core business function has created a significant risk. Bud...
Question 350: Which of the following is the MOST important delivery outcom...
Question 351: Senior management commitment and support will MOST likely be...
Question 352: Which of the following is the MOST important reason to devel...
Question 353: Which of the following is the PRIMARY role of a data custodi...
Question 354: Which of the following is the PRIMARY driver of information ...
Question 355: Which of the following is the PRIMARY goal of an incident re...
Question 356: Which of the following is the MOST significant benefit of ef...
Question 357: An information security team has identified traffic from a d...
Question 358: Which of the following is MOST effective in the strategic al...
Question 359: Which of the following provides a sound basis for effective ...
Question 360: Which of the following would be MOST effective when justifyi...
Question 361: Which of the following is the BEST course of action for an i...
Question 362: Segregation of duties is a security control PRIMARILY used t...
Question 363: What should be the FIRST step when developing an asset manag...
Question 364: Which of the following will BEST ensure that possible securi...
Question 365: Which of the following is MOST important to consider when de...
Question 366: Which of the following is the FIRST step in developing a bus...
Question 367: Which of the following is the BEST way to evaluate the impac...
Question 368: Which of the following will BEST help to ensure security is ...
Question 369: A critical server for a hospital has been encrypted by ranso...
Question 370: Following a highly sensitive data breach at a large company,...
Question 371: Which of the following is the PRIMARY objective of reporting...
Question 372: Which of the following is a PRIMARY responsibility of an inf...
Question 373: The criticality of an information asset is derived from its:...
Question 374: Which of the following is the MOST important consideration o...
Question 375: Which of the following should be the PRIMARY basis for a sev...
Question 376: Which of the following external entities would provide the B...
Question 377: Which of the following is the FIRST step when assessing risk...
Question 378: Which of the ager to regularly report to senior management?...
Question 379: What is the MOST important role of an organization's data cu...
Question 380: When defining and communicating roles and responsibilities b...
Question 381: An organization has concerns regarding a potential advanced ...
Question 382: Which of the following metrics is the MOST appropriate for m...
Question 383: Which of the following provides the BEST preparation for han...
Question 384: Which type of test is MOST effective in communicating the ro...
Question 385: A third-party contract signed by a business unit manager fai...
Question 386: An organization has acquired a new system with strict mainte...
Question 387: An organization plans to acquire and implement a new web-bas...
Question 388: To help users apply appropriate controls related to data pri...
Question 389: Which of the following is the BEST option for addressing reg...
Question 390: What is the BEST way to determine the level of risk associat...
Question 391: Which of the following is the BEST evidence that an organiza...
Question 392: Which of the following is the BEST reason to separate short-...
Question 393: An organization with a maturing incident response program co...
Question 394: An information security manager is reviewing the business ca...
Question 395: An email digital signature will:...
Question 396: The PRIMARY goal of a post-incident review should be to...
Question 397: The BEST way to ensure information security efforts and init...
Question 398: Which of the following is the MOST effective approach for in...
Question 399: Which of the following is a MAIN security challenge when con...
Question 400: The PRIMARY objective of a risk response strategy should be:...
Question 401: An internal security audit has reported that authentication ...
Question 402: An information security manager is asked to provide evidence...
Question 403: Which of the following would BEST enable effective decision-...
Question 404: Which of the following is the BEST way for an organization t...
Question 405: Which of the following is the STRONGEST indicator of effecti...
Question 406: A business unit has updated its long-term business plan to i...
Question 407: Senior management is concerned that the incident response te...
Question 408: An organization's information security manager is performing...
Question 409: Which of the following is the BEST way to demonstrate to sen...
Question 410: Which of the following is MOST important to consider when de...
Question 411: When training an incident response team, the advantage of us...
Question 412: An IT department plans to migrate an application to the publ...
Question 413: Which of the following is the MOST useful metric for determi...
Question 414: Which of the following is the MOST important consideration m...
Question 415: Which of the following provides the BEST indication that the...
Question 416: When establishing metrics for an information security progra...
Question 417: Which of the following BEST enables an information security ...
Question 418: Which of the following is the BEST evidence that information...
Question 419: Which of the following would BEST enable an organization to ...
Question 420: Which of the following would BEST assist an information secu...
Question 421: Which of the following is the MOST effective defense against...
Question 422: Which of the following is the PRIMARY responsibility of an i...
Question 423: An external security audit has reported multiple instances o...
Question 424: An organization s senior management wants to allow employees...
Question 425: Which of the following is the PRIMARY objective of the incid...
Question 426: Which of the following is the MOST effective way to ensure s...
Question 427: The BEST way to identify the risk associated with a social e...
Question 428: Which of the following should be the PRIMARY focus of a stat...
Question 429: Which of the following is the BEST indication of an effectiv...
Question 430: A new information security manager finds that the organizati...
Question 431: Which of the following is MOST important to implement when u...
Question 432: Which of the following is the PRIMARY reason to conduct peri...
Question 433: Which of the following is the MOST important reason to consi...
Question 434: Which of the following will BEST facilitate the development ...
Question 435: When implementing a new risk assessment methodology, which o...
Question 436: Which of the following would provide the BEST evidence to se...
Question 437: Which of the following is the GREATEST benefit of conducting...
Question 438: Senior management is concerned a security solution may not a...
Question 439: Which of the following should be the information security ma...
Question 440: Which of the following provides the BEST means of ensuring b...
Question 441: An information security manager is developing evidence prese...
Question 442: An organization plans to implement a document collaboration ...
Question 443: An organization involved in e-commerce activities operating ...
Question 444: Which of the following is the BEST way to increase the visib...
Question 445: Which of the following is MOST important for effective commu...
Question 446: Which of the following BEST ensures timely and reliable acce...
Question 447: Senior management has launched an enterprise-wide initiative...
Question 448: Management has announced the acquisition of a new company. T...
Question 449: What is a potential issue when emails are encrypted and digi...
Question 450: An information security manager has identified numerous viol...
Question 451: Which of the following would BEST demonstrate the maturity l...
Question 452: Which of the following should be the PRIMARY consideration w...
Question 453: When selecting risk response options to manage risk, an info...
Question 454: An organization is considering the adoption of cloud service...
Question 455: Which of the following is the BKT approach for an informatio...
Question 456: During an annual security review of an organizations servers...
Question 457: Which of the following BEST demonstrates that the objectives...
Question 458: Which of the following would BEST help to ensure an organiza...
Question 459: The selection of security controls is PRIMARILY linked to:...
Question 460: Senior management has allocated funding to each of the organ...
Question 461: An organization is considering moving lo a cloud service pro...
Question 462: From an Information security perspective, legal issues assoc...
Question 463: An information security manager has been informed of a new v...
Question 464: For computer forensics evidence to be admissible in a court ...
Question 465: Adding security requirements late in the software developmen...
Question 466: Which of the following threats is prevented by using token-b...
Question 467: The BEST way to avoid session hijacking is to use:...
Question 468: For an organization that encourages sales activities using m...
Question 469: Which of the following metrics would BEST monitor how well i...
Question 470: Which of the following would BEST ensure that application se...
Question 471: Which of the following is the MOST effective approach of del...
Question 472: The PRIMARY goal of conducting a business impact analysis (B...
Question 473: Which of the following should be the PRIMARY consideration w...
Question 474: Which of the following is the BEST evidence that proper secu...
Question 475: Which of the following is an information security manager's ...
Question 476: Which of the following is MOST important to include in contr...
Question 477: An organization has implemented a bring your own device (BYO...
Question 478: Which of the following is MOST useful to an information secu...
Question 479: Risk scenarios simplify the risk assessment process by:...
Question 480: Which of the following would provide senior management with ...
Question 481: An organization has announced company-wide budget cuts due t...
Question 482: Which of the following is the MOST important reason to ident...
Question 483: Which of the following activities BEST enables executive man...
Question 484: Which of the following is the MOST significant security risk...
Question 485: Which of the following is the MOST important factor to ensur...
Question 486: Which of the following should be established FIRST when impl...
Question 487: Senior management is concerned several security incidents we...
Question 488: A corporate web site has become compromised as a result of a...
Question 489: A data-hosting organization's data center houses servers, ap...
Question 490: System logs and audit logs for sensitive systems should be s...
Question 491: Which of the following is MOST important for the alignment o...
Question 492: During a review to approve a penetration test plan, which of...
Question 493: Which of the following BEST protects against phishing attack...
Question 494: Which of the following is the MOST effective mitigation stra...
Question 495: Which of the following should an incident response team do N...
Question 496: Which of the following is the MOST effective way to ensure t...
Question 497: Which of the following would BEST protect against web-based ...
Question 498: What is the PRIMARY benefit to executive management when aud...
Question 499: Which of the following will BEST facilitate the understandin...
Question 500: Which of the following BEST supports the risk assessment pro...
Question 501: There are concerns that security events are not reported to ...
Question 502: An information security manager finds that corporate informa...
Question 503: A threat intelligence report indicates there has been a sign...
Question 504: A recent phishing attack investigation showed that several e...
Question 505: When selecting metrics to monitor the risks associated with ...
Question 506: For a business operating in a competitive and evolving onlin...
Question 507: In information security manager MUST have an understanding o...
Question 508: The PRIMARY advantage of challenge-response authentication o...
Question 509: A data loss prevention (DLP) tool has flagged personally ide...
Question 510: Web-server security can BEST be enhanced by:...
Question 511: A core business unit relies on an effective legacy system th...
Question 512: Which of the following would provide senior management with ...
Question 513: When using a newly implemented security information and even...
Question 514: Which of the following should the information security manag...
Question 515: Which of the following devices, when placed in a demilitariz...
Question 516: Which of the following is MOST critical for an effective inf...
Question 517: Which of the following is the MOST important reason for perf...
Question 518: The MOST important reason for an information security manage...
Question 519: The decision to escalate an incident should be based PRIMARI...
Question 520: Which of the following models provides a client organization...
Question 521: Which of the following is MOST important to the successful i...
Question 522: Business applications should be selected for disaster recove...
Question 523: When two different controls are available to mitigate a risk...
Question 524: Which of the following should be the PRIMARY objective when ...
Question 525: Which of the following is MOST important for the effectivene...
Question 526: What should be an information security manager's NEXT activi...
Question 527: When scoping a risk assessment, assets need to be classified...
Question 528: Which of the following is the PRIMARY responsibility of the ...
Question 529: Which of the following is MOST helpful in securing funding f...
Question 530: Which of the following should be the MOST important criteria...
Question 531: Which of the following is the MOST important consideration w...
Question 532: Which of the following is the MOST effective method to help ...
Question 533: Which of the following would BEST enable an information secu...
Question 534: What is the PRIMARY purpose of an unannounced disaster recov...
Question 535: When preparing a business case for the implementation of a s...
Question 536: Human resources is evaluating potential Software as a Servic...
Question 537: Who should an information security manager contact FIRST upo...
Question 538: Which of the following sites would be MOST appropriate in th...
Question 539: An organization has remediated a security flaw in a system W...
Question 540: The PRIMARY reason for using information security metrics is...
Question 541: Which of the following is an information security manager's ...
Question 542: Key systems necessary for branch operations reside at corpor...
Question 543: Which of the following is an information security manager's ...
Question 544: Which of the following should be the PRIMARY consideration w...
Question 545: Application data integrity risk is MOST directly addressed b...
Question 546: Which of the following is a PRIMARY security responsibility ...
Question 547: An audit reveals that some of an organizations software is e...
Question 548: An organization is considering whether to allow employees to...
Question 549: To address the issue that performance pressures on IT may co...
Question 550: Which of the following is the MOST effective way to protect ...
Question 551: An information security manager terms that the root password...
Question 552: Which of the following is MOST effective in reducing the fin...
Question 553: An organization has decided to implement a security informat...
Question 554: The MOST important objective of security awareness training ...
Question 555: Which is MOST important when contracting an external party t...
Question 556: Who within an organization is accountable for ensuring incid...
Question 557: Which of the following MUST be established before implementi...
Question 558: Which of the following functions is MOST critical when initi...
Question 559: What should be information security manager's FIRST course o...
Question 560: When reporting on the effectiveness of the information secur...
Question 561: Which of the following is the PRIMARY purpose of establishin...
Question 562: To implement a security framework, an information security m...
Question 563: Which of the following BEST supports information security ma...
Question 564: Which of the following BEST reduces the likelihood of leakag...
Question 565: Executive management is considering outsourcing all IT opera...