An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification for granting an exception to the policy?
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?
Which of the following is MOST important to include in an incident response plan to ensure incidents are responded to by the appropriate individuals?
Which of the following is the MOST important reason for obtaining input from risk owners when implementing controls?
The MAIN reason for having senior management review and approve an information security strategic plan is to ensure:
An anomaly-based intrusion detection system (IDS) operates by gathering data on:
Which of the following sources is MOST useful when planning a business-aligned information security program?
An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?
When creating an incident response plan, the PRIMARY benefit of establishing a clear definition of a security incident is that it helps to:
Which of the following is the BEST indication that an organization has a mature information security culture?
An information security manager determines there are a significant number of exceptions to a newly released industry-required security standard. Which of the following should be done NEXT?
During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:
PDF + Testing Engine |
---|
$99.6 |
Testing Engine |
---|
$90 |
PDF (Q&A) |
---|
$79.6 |
Isaca Free Exams |
---|
|