In the context of developing an information security strategy, which of the following provides the MOST useful input to determine the or
Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?
Which of the following is MOST important to include in a post-incident review following a data breach?
An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?
A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?
Labeling information according to its security classification:
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
Which of the following is the PRIMARY reason to use a phased incident recovery approach?
Which of the following should be the FIRST step in developing an information security strategy?
When establishing an information security governance framework, it is MOST important for an information security manager to understand:
After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?
Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?
A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?
Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?
During which of the following development phases is it MOST challenging to implement security controls?
Which of the following is the MOST important reason to involve external forensics experts in evidence collection when responding to a major security breach?
Which of the following is the BEST indicator of the maturity level of a vendor risk management process?
How does an incident response team BEST leverage the results of a business impact analysis (BIA)?
Which of the following is the BEST indication of an effective information security awareness training program?
Which of the following is MOST critical when creating an incident response plan?
PDF + Testing Engine
|
---|
$87.15 |
Testing Engine
|
---|
$78.75 |
PDF (Q&A)
|
---|
$69.65 |
Isaca Free Exams |
---|
![]() |