Which of the following components of an information security risk assessment is MOST valuable to senior management?
Which of the following BEST enables an organization to identify and contain security incidents?
Which of the following roles is accountable for ensuring the impact of a new regulatory framework on a business system is assessed?
Management decisions concerning information security investments will be MOST effective when they are based on:
When developing an incident escalation process, the BEST approach is to classify incidents based on:
Which of the following is the BEST course of action for an information security manager to align security and business goals?
Which of the following is the MOST critical factor for information security program success?
Which of the following is the MOST common cause of cybersecurity breaches?
Which of the following is the BEST source of information to support an organization's information security vision and strategy?
An organization finds it necessary to quickly shift to a work-fromhome model with an increased need for remote access security.
Which of the following should be given immediate focus?
Which of the following is MOST important when defining how an information security budget should be allocated?
An organization has identified a weakness in the ability of its employees to identify and report cybersecurity incidents. Although training materials have been provided, employees show a lack of interest. Which of the following is the information security manager’s BEST course of action?
Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?
When assigning a risk owner, the MOST important consideration is to ensure the owner has:
Which of the following presents the GREATEST challenge to a large multinational organization using an automated identity and access management (1AM) system?
Detailed business continuity plans (BCPs) should be PRIMARILY based on:
The PRIMARY objective of performing a post-incident review is to:
Which of the following is the MOST effective way to determine the alignment of an information security program with the business strategy?
Which of the following is the PRIMARY objective of a cyber resilience strategy?
PDF + Testing Engine
|
---|
$99.6 |
Testing Engine
|
---|
$90 |
PDF (Q&A)
|
---|
$79.6 |
Isaca Free Exams |
---|
![]() |