Of the following, who should be assigned as the owner of a newly identified risk related to an organization's new payroll system?
The PRIMARY reason to properly classify information assets is to determine:
An enterprise has decided to procure security services from a third-party vendor to support its information security program. Which of the following is MOST important to include in the vendor selection criteria?
Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?
When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?
Which of the following should be the PRIMARY basis for a severity hierarchy for information security incident classification?
Which of the following BEST facilitates an information security manager's efforts to obtain senior management commitment for an information security program?
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
The PRIMARY benefit of integrating information security activities into change management processes is to:
Which of the following is the MOST effective way to influence organizational culture to align with security guidelines?
Which of the following is the BEST approach for governing noncompliance with security requirements?
Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization’s information security program?
Which of the following BEST enables an organization to determine the costs of downtime for a critical application?
During the due diligence phase of an acquisition, the MOST important course of action for an information security manager is to:
When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?
Several months after the installation of a new firewall with intrusion prevention features to block malicious activity, a breach was discovered that came in through the firewall shortly after installation. This breach could have been detected earlier by implementing firewall:
Which of the following is the PRIMARY objective of incident triage?
An international organization with remote branches is implementing a corporate security policy for managing personally identifiable information (PII). Which of the following should be the information security manager's MAIN concern?
A business impact analysis (BIA) should be periodically executed PRIMARILY to:
Which of the following should be the PRIMARY focus of a status report on the information security program to senior management?
PDF + Testing Engine
|
---|
$99.6 |
Testing Engine
|
---|
$90 |
PDF (Q&A)
|
---|
$79.6 |
Isaca Free Exams |
---|
![]() |