Which of the following is the MOST effective way to prevent information security incidents?
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
Which of the following would BEST help to ensure compliance with an organization's information security requirements by an IT service provider?
Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
Which of the following is ESSENTIAL to ensuring effective incident response?
Which of the following is the PRIMARY reason to conduct a post-incident review?
Which of the following is the MOST important outcome of effective risk treatment?
Which of the following MUST happen immediately following the identification of a malware incident?
What should an information security manager verify FIRST when reviewing an information asset management program?
An organization is experiencing a sharp increase in incidents related to phishing messages. The root cause is an outdated email filtering system that is no longer supported by the vendor. Which of the following should be the information security manager's FIRST course of action?
An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?
Which of the following trends would be of GREATEST concern when reviewing the performance of an organization's intrusion detection systems (IDSs)?
Which of the following provides the MOST effective response against ransomware attacks?
During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
Before approving the implementation of a new security solution, senior management requires a business case. Which of the following would BEST support the justification for investment?
Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?
Which of the following is the BEST course of action when an information security manager identifies that systems are vulnerable to emerging threats?
Threat and vulnerability assessments are important PRIMARILY because they are:
Which of the following BEST enables an organization to determine what activities and changes have occurred on a system during a cybersecurity incident?
An organization is implementing an information security governance framework. To communicate the program's effectiveness to stakeholders, it is MOST important to establish:
PDF + Testing Engine
|
---|
$87.15 |
Testing Engine
|
---|
$78.75 |
PDF (Q&A)
|
---|
$69.65 |
Isaca Free Exams |
---|
![]() |