Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?
Which of the following should be the KEY consideration when creating an information security communication plan with industry peers?
Which of the following sources is MOST useful when planning a business-aligned information security program?
An information security manager has recently been notified of potential security risks associated with a third-party service provider. What should be done NEXT to address this concern?
An incident management team is alerted ta a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
Which of the following is the MOST important objective of post-incident review activities?
Which of the following should be the PRIMARY basis for determining the value of assets?
Which of the following is MOST effective in monitoring an organization's existing risk?
Which of the following roles is PRIMARILY responsible for developing an information classification framework based on business needs?
Which of the following would BEST demonstrate the status of an organization's information security program to the board of directors?
Which of the following is the FIRST step in developing a business continuity plan (BCP)?
Which of the following is the MOST important consideration during the design phase of a business impact analysis (BIA)?
Which of the following is the BEST method to protect the confidentiality of data transmitted over the Internet?
Which of the following BEST supports effective communication during information security incidents7
Which of the following is MOST important to consider when aligning a security awareness program with the organization's business strategy?
An incident management team is alerted to a suspected security event. Before classifying the suspected event as a security incident, it is MOST important for the security manager to:
Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?
An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?
Which of the following is MOST important for an information security manager to consider when identifying information security resource requirements?
The PRIMARY purpose for continuous monitoring of security controls is to ensure:
PDF + Testing Engine
|
---|
$87.15 |
Testing Engine
|
---|
$78.75 |
PDF (Q&A)
|
---|
$69.65 |
Isaca Free Exams |
---|
![]() |