To inform a risk treatment decision, which of the following should the information security manager compare with the organization's risk appetite?
Which of the following should an information security manager do FIRST when creating an organization's disaster recovery plan (DRP)?
Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?
Which of the following is the MOST effective way to demonstrate alignment of information security strategy with business objectives?
Which of the following is the MOST important requirement for a successful security program?
When choosing the best controls to mitigate risk to acceptable levels, the information security manager's decision should be MAINLY driven by:
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
What is the BEST way to reduce the impact of a successful ransomware attack?
The PRIMARY goal to a post-incident review should be to:
Measuring which of the following is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?
Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?
Which of the following is the GREATEST benefit of including incident classification criteria within an incident response plan?
Which of the following is MOST important when responding to a major security incident?
When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the BEST way to ensure effective and timely investigations following an information security incident?
Which of the following is the PRIMARY purpose of an acceptable use policy?
Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?
How would the information security program BEST support the adoption of emerging technologies?
Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?
Which of the following is a viable containment strategy for a distributed denial of service (DDoS) attack?
Which of the following provides the MOST useful information for identifying security control gaps on an application server?
PDF + Testing Engine
|
---|
$99.6 |
Testing Engine
|
---|
$90 |
PDF (Q&A)
|
---|
$79.6 |
Isaca Free Exams |
---|
![]() |