When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?
Reevaluation of risk is MOST critical when there is:
Which of the following has the GREATEST impact on efforts to improve an organization's security posture?
Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
The PRIMARY purpose for deploying information security metrics is to:
If civil litigation is a goal for an organizational response to a security incident, the PRIMARY step should be to:
Which of the following tools provides an incident response team with the GREATEST insight into insider threat activity across multiple systems?
The categorization of incidents is MOST important for evaluating which of the following?
An incident handler is preparing a forensic image of a hard drive. Which of the following MUST be done to provide evidence that the image is an exact copy of the original?
When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?
Network isolation techniques are immediately implemented after a security breach to:
Which of the following is an information security manager's MOST important course of action when responding to a major security incident that could disrupt the business?
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
Which of the following is the BEST approach to make strategic information security decisions?
An organization is selecting security metrics to measure security performance, and a firewall specialist suggests tracking the number of external attacks blocked by the firewalls. Which of the following is the GREATEST concern with using this metric?
Which of the following is the PRIMARY reason to assign a risk owner in an organization?
An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
Which of the following is the MOST important reason to conduct interviews as part of the business impact analysis (BIA) process?
PDF + Testing Engine
|
---|
$99.6 |
Testing Engine
|
---|
$90 |
PDF (Q&A)
|
---|
$79.6 |
Isaca Free Exams |
---|
![]() |