Which of the following elements of a service contract would BEST enable an organization to monitor the information security risk associated with a cloud service provider?
Which of the following should an information security manager do FIRST to address the risk associated with a new third-party cloud application that will not meet organizational security requirements?
Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?
An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
Which of the following is the MOST critical consideration when shifting IT operations to an Infrastructure as a Service (laaS) model hosted in a foreign country?
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
To help ensure that an information security training program is MOST effective, its contents should be:
Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?
Which of the following is the MOST effective way to ensure the security of services and solutions delivered by third-party vendors?
A risk owner has accepted a large amount of risk due to the high cost of controls. Which of the following should be the information security manager's PRIMARY focus in this situation?
An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?
Which of the following is MOST important for the effective implementation of an information security governance program?
PDF + Testing Engine |
---|
$99.6 |
Testing Engine |
---|
$90 |
PDF (Q&A) |
---|
$79.6 |
Isaca Free Exams |
---|
|