Which of the following is the GREATEST benefit of incorporating information security governance into the corporate governance framework?
Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?
Which of the following BEST supports the incident management process for attacks on an organization's supply chain?
Which of the following should be done FIRST when implementing a security program?
Which of the following presents the GREATEST risk associated with the use of an automated security information and event management (SIEM) system?
Information security policies should PRIMARILY reflect alignment with:
The MOST important reason for having an information security manager serve on the change management committee is to:
Which of the following is MOST helpful to identify whether information security policies have been followed?
Which of the following is the GREATEST inherent risk when performing a disaster recovery plan (DRP) test?
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
Which of the following change management procedures is MOST likely to cause concern to the information security manager?
Management has announced the acquisition of a new company. The information security manager of the parent company is concerned that conflicting access rights may cause critical information to be exposed during the integration of the two companies. To BEST address this concern, the information security manager should:
Recovery time objectives (RTOs) are an output of which of the following?
Which of the following would provide the BEST evidence to senior management that security control performance has improved?
Which of the following is MOST important when designing security controls for new cloud-based services?
Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?
Which of the following BEST helps to ensure a third-party backup site continues to meet the organization’s information security standards?
When establishing metrics for an information security program, the BEST approach is to identify indicators that:
Which of the following should be the PRIMARY objective when establishing a new information security program?
Which of the following is the BEST way to help ensure alignment of the information security program with organizational objectives?
PDF + Testing Engine
|
---|
$87.15 |
Testing Engine
|
---|
$78.75 |
PDF (Q&A)
|
---|
$69.65 |
Isaca Free Exams |
---|
![]() |