Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?
When collecting admissible evidence, which of the following is the MOST important requirement?
Which of the following is the MOST essential element of an information security program?
Which of the following BEST indicates that an information security governance framework has been successfully implemented?
The PRIMARY benefit of introducing a single point of administration in network monitoring is that it:
Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?
After a server has been attacked, which of the following is the BEST course of action?
A PRIMARY benefit of adopting an information security framework is that it provides:
An information security manager is alerted to multiple security incidents across different business units, with unauthorized access to sensitive data and potential data exfiltration from critical systems. Which of the following is the BEST course of action to appropriately classify and prioritize these incidents?
During which phase of an incident response plan is the root cause determined?
A new regulatory requirement affecting an organization's information security program is released. Which of the following should be the information security manager's FIRST course of action?
Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?
When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?
Which of the following is BEST used to determine the maturity of an information security program?
Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?
A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?
The MOST useful technique for maintaining management support for the information security program is:
A global organization is considering its geopolitical security risks. Which of the following is the information security manager's BEST approach?
Of the following, who is in the BEST position to evaluate business impacts?
Which of the following is the BEST indication of a mature information security program?
PDF + Testing Engine
|
---|
$99.6 |
Testing Engine
|
---|
$90 |
PDF (Q&A)
|
---|
$79.6 |
Isaca Free Exams |
---|
![]() |