Information Security Management Responsibilities Quiz

Information Security Management Responsibilities Quiz

Created by
@BeneficialSagacity1258

Questions and Answers

What action did the bad actor take after being exposed to encrypted data transferred to the server?

Deleted the FTP directory

What could have been prevented by conducting regular incident response testing?

Ignored alert messages

What was the method used by the bad actor to break into the business-critical FTP server?

Brute forcing an administrative password

What consequence did the bad actor's actions have on legitimate customers?

<p>Incoming FTP attempts failed</p> Signup and view all the answers

What is the PRIMARY step for an organizational response to a security incident if civil litigation is a goal?

<p>Document the chain of custody</p> Signup and view all the answers

What is the MOST effective in monitoring an organization's existing risk?

<p>Risk management dashboards</p> Signup and view all the answers

What is the BEST way to reduce the impact of a successful ransomware attack?

<p>Perform frequent backups and store them offline</p> Signup and view all the answers

Which of the following BEST facilitates an information security manager's efforts to obtain senior management commitment for an information security program?

<p>Presenting compliance requirements</p> Signup and view all the answers

Which of the following is the MOST important reason to conduct interviews as part of the business impact analysis (BIA) process?

<p>To ensure the stakeholders providing input own the related risk</p> Signup and view all the answers

Which of the following would BEST enable the timely execution of an incident response plan?

<p>Definition of trigger events</p> Signup and view all the answers

Which of the following change management procedures is MOST likely to cause concern to the information security manager?

<p>The development manager migrates programs into production</p> Signup and view all the answers

What is the GREATEST benefit of conducting an organization-wide security awareness program?

<p>Security behavior is improved</p> Signup and view all the answers

Which of the following documents should contain the INITIAL prioritization of recovery of services?

<p>Business impact analysis (BIA)</p> Signup and view all the answers

What is the first step in creating a disaster recovery plan (DRP)?

<p>Conducting a business impact analysis (BIA)</p> Signup and view all the answers

What is the subsequent step involving assigning roles and responsibilities for executing the DRP?

<p>Identifying response and recovery teams</p> Signup and view all the answers

What is the primary responsibility of an information security manager implementing company-owned mobile devices?

<p>Review and update existing security policies</p> Signup and view all the answers

What has the greatest influence on an organization's information security strategy?

<p>Risk tolerance</p> Signup and view all the answers

What do security policies define?

<p>Goals, objectives, and requirements for protecting information and systems</p> Signup and view all the answers

What is the most effective way to present quarterly reports to the board on the status of the information security program?

<p>An information security dashboard</p> Signup and view all the answers

What should the information security manager address in security policies?

<p>Scope, acceptable use, security standards, roles and responsibilities</p> Signup and view all the answers

How does an anomaly-based intrusion detection system (IDS) operate?

<p>By gathering data on normal network behavior and using it as a baseline for measuring abnormal activity</p> Signup and view all the answers

How is the effectiveness of an organization's information security program best measured?

<p>Return on information security investment</p> Signup and view all the answers

What justifies continued investment in an information security program?

<p>Reduction in residual risk</p> Signup and view all the answers

What is most helpful in protecting an enterprise from advanced persistent threats (APTs)?

<p>Defined security standards</p> Signup and view all the answers

What is not the first step to establishing an effective information security program?

<p>Compliance review</p> Signup and view all the answers

What should drive the information security manager's decision when choosing controls to mitigate risk?

<p>Regulatory requirements</p> Signup and view all the answers

What determines how much risk an organization is willing to accept and the resources allocated to mitigate or transfer risk?

<p>Risk tolerance</p> Signup and view all the answers

What is the first step an information security manager should take when creating an organization's disaster recovery plan (DRP)?

<p>Conduct a business impact analysis (BIA)</p> Signup and view all the answers

What is a subsequent step involving selecting and implementing appropriate solutions and procedures for restoring critical business functions?

<p>Developing response and recovery strategies</p> Signup and view all the answers

What is the best determinant of resource allocation during a security incident response?

<p>Defined levels of severity</p> Signup and view all the answers

What is not the most effective way to present quarterly reports to the board on the status of the information security program?

<p>Anomaly-based intrusion detection system (IDS)</p> Signup and view all the answers

What are possible actions or controls derived from updated security policies?

<p>Requiring remote wipe capabilities, conducting security awareness training, and enforcing passwords and data encryption</p> Signup and view all the answers

What balances the cost of security controls with the potential impact of security incidents?

<p>An organization's risk tolerance</p> Signup and view all the answers

How should an information security manager measure the effectiveness of the security program?

<p>By return on information security investment</p> Signup and view all the answers

What is the subsequent step defining communication channels and protocols for notifying and updating stakeholders during and after a disruption?

<p>Reviewing the communications plan</p> Signup and view all the answers

What should an information security manager promote to overcome the perception that security is a hindrance to business activities?

<p>The relevance and contribution of security</p> Signup and view all the answers

What are subsequent steps in creating a disaster recovery plan (DRP) after conducting a business impact analysis (BIA)?

<p>Identifying the response and recovery teams, reviewing the communications plan, and developing response and recovery strategies</p> Signup and view all the answers

What is the primary purpose for continuous monitoring of security controls?

<p>To ensure the effectiveness of controls and identify potential weaknesses</p> Signup and view all the answers

How can incident response teams best leverage the results of a business impact analysis (BIA)?

<p>By assigning restoration priority during incidents based on the BIA findings</p> Signup and view all the answers

What is the next step for the information security manager after deciding to adopt a bring your own device (BYOD) strategy?

<p>Define control requirements to ensure the security policy framework encompasses the new business model</p> Signup and view all the answers

What should an effective information security training program be based on?

<p>Employees' roles and responsibilities, tailored to specific job functions</p> Signup and view all the answers

How is the evaluation of incident response effectiveness best supported?

<p>By a post-incident review process</p> Signup and view all the answers

What is the primary responsibility of an information security manager in an organization implementing the use of company-owned mobile devices?

<p>To require remote wipe capabilities for devices to enhance security</p> Signup and view all the answers

What is the best option to lower the cost of implementing application security controls?

<p>Integrate security activities within the development process to address security throughout the SDLC</p> Signup and view all the answers

What should the information security manager communicate when reporting to senior management?

<p>Potential business impact with regard to open items from the risk register</p> Signup and view all the answers

What are stolen data breaches related to, despite incident response testing?

<p>Security breaches that may occur despite the incident response plan or process</p> Signup and view all the answers

What is the subsequent step after a risk assessment to ensure the security policy framework aligns with the BYOD strategy?

<p>Defining control requirements</p> Signup and view all the answers

What is the MOST effective way to lower the cost of implementing application security controls?

<p>Integrate security activities within the development process to address security throughout the SDLC</p> Signup and view all the answers

What is the primary responsibility for an information security manager after adopting a bring your own device (BYOD) strategy?

<p>Define control requirements to ensure the security policy framework encompasses the new business model</p> Signup and view all the answers

What is the GREATEST inherent risk when performing a disaster recovery plan (DRP) test?

<p>Disruption to the production environment</p> Signup and view all the answers

Which activity is designed to handle a control failure that leads to a breach?

<p>Incident management</p> Signup and view all the answers

What should an information security manager initiate FIRST when a finance department director decides to outsource the organization's budget application?

<p>Determine the required security controls for the new solution</p> Signup and view all the answers

What is the GREATEST benefit of conducting an organization-wide security awareness program?

<p>Improving incident response effectiveness</p> Signup and view all the answers

What should an information security manager determine before outsourcing?

<p>Security controls based on risk appetite, policies, and regulatory requirements</p> Signup and view all the answers

How is integrating information security governance into corporate governance best enabled?

<p>By an information security steering committee with business representation</p> Signup and view all the answers

When is the most appropriate time to conduct a disaster recovery test?

<p>After major business processes have been redesigned</p> Signup and view all the answers

What should be the highest priority for an organization creating an enterprise strategy for protecting data across multiple repositories?

<p>Data encryption standards</p> Signup and view all the answers

What is the most useful for an information security manager when determining the need to escalate an incident to senior management?

<p>The organizational risk register</p> Signup and view all the answers

What would be most helpful to identify worst-case disruption scenarios?

<p>Business impact analysis (BIA)</p> Signup and view all the answers

What should be the highest priority for an organization with a high volume of sensitive data and limited resources?

<p>Data retention strategy</p> Signup and view all the answers

What are essential for measuring the effectiveness of information security governance?

<p>Key performance indicators (KPIs)</p> Signup and view all the answers

What best enables the integration of information security governance into corporate governance?

<p>Clear lines of authority across the organization</p> Signup and view all the answers

What should an information security manager obtain on the service providers' hosting environment?

<p>Audit reports</p> Signup and view all the answers

What is the primary responsibility of security policy provisions in an organization's information security governance framework?

<p>To establish and maintain a framework for information security governance</p> Signup and view all the answers

Which security objective best ensures that information is protected against unauthorized disclosure?

<p>Confidentiality</p> Signup and view all the answers

What is the most important factor in an organization's selection of a key risk indicator (KRI)?

<p>The criticality of information</p> Signup and view all the answers

What is the process of establishing and maintaining a framework to provide assurance that information security strategies are aligned with and support business objectives, consistent with applicable laws and regulations, and managed effectively and efficiently?

<p>Information security governance</p> Signup and view all the answers

Which of the following is a perspective typically included in a balanced scorecard for information security governance?

<p>Financial</p> Signup and view all the answers

What does confidentiality mean in the context of information security?

<p>Only authorized parties can access or view sensitive information</p> Signup and view all the answers

What is the purpose of a balanced scorecard in information security governance?

<p>To measure and communicate the performance and progress of an organization toward its strategic goals</p> Signup and view all the answers

What is the role of the criticality of information in prioritizing risks?

<p>To prioritize risks and focus on the most significant ones</p> Signup and view all the answers

What is the primary purpose of an information security program?

<p>To achieve specific objectives within constraints such as time, budget, scope, and quality</p> Signup and view all the answers

What is the primary responsibility of security policy provisions in aligning the information security governance framework with business strategy and objectives?

<p>To establish and maintain a framework for information security governance</p> Signup and view all the answers

What is the primary focus of risk management?

<p>Identifying, analyzing, evaluating, treating, monitoring, and communicating risks</p> Signup and view all the answers

Which of the following is an essential component of an information security governance framework?

<p>Establishing and maintaining a framework for information security governance</p> Signup and view all the answers

What is the most important consideration when determining which type of failover site to employ?

<p>Recovery time objectives (RTOs)</p> Signup and view all the answers

What does confidentiality mean in the context of information security?

<p>Only authorized parties can access or view sensitive information</p> Signup and view all the answers

What is the primary responsibility of an information security manager regarding compliance requirements?

<p>Embedding compliance requirements within operational processes</p> Signup and view all the answers

What is the primary responsibility of an information security manager implementing company-owned mobile devices?

<p>To ensure compliance with relevant laws and regulations</p> Signup and view all the answers

What is the main purpose of a balanced scorecard in the context of information security programs?

<p>Measuring and reporting on key performance indicators and key risk indicators</p> Signup and view all the answers

What is the primary focus of security metrics in the context of information security program effectiveness?

<p>Reporting to key stakeholders regarding the effectiveness of an information security program</p> Signup and view all the answers

What is the primary focus of performance in an organizational context?

<p>Achieving organizational objectives or meeting standards</p> Signup and view all the answers

What is the primary goal of regulatory compliance?

<p>Following external legal mandates set forth by governments</p> Signup and view all the answers

What is the main focus of recovery time objectives (RTOs) in the context of failover sites?

<p>Determining which type of failover site to employ</p> Signup and view all the answers

What is the primary focus of embedding compliance requirements within operational processes?

<p>Providing ongoing assurance that legal and regulatory compliance requirements can be met</p> Signup and view all the answers

What is the most important aspect of project management in an organizational context?

<p>Planning, executing, and monitoring projects to achieve specific objectives within constraints</p> Signup and view all the answers

What is the primary focus of security metrics in the context of information security program effectiveness?

<p>Reporting to key stakeholders regarding the effectiveness of an information security program</p> Signup and view all the answers

Which of the following is the BEST way to enable an organization to enhance its incident response plan processes and procedures?

<p>Lessons learned analysis</p> Signup and view all the answers

A risk assessment exercise has identified the threat of a denial of service (DoS) attack. Executive management has decided to take no further action related to this risk. The MOST likely reason for this decision is:

<p>The cost of implementing controls exceeds the potential financial losses</p> Signup and view all the answers

An organization has introduced a new bring your own device (BYOD) program. The security manager has determined that a small number of employees are utilizing free cloud storage services to store company data through their mobile devices. Which of the following is the MOST effective course of action?

<p>Assess the business need to provide a secure solution</p> Signup and view all the answers

What is the BEST way to determine the maturity of an information security program?

<p>Security metrics</p> Signup and view all the answers

Before relying on a vendor's certification for international security standards, what is the MOST important for the information security manager to confirm?

<p>Certification scope is relevant to the service being offered</p> Signup and view all the answers

What is the primary purpose of security metrics in an information security program?

<p>Evaluate the current state of security</p> Signup and view all the answers

In the context of information security, what is the BEST way to communicate the value and impact of security to stakeholders?

<p>Security metrics</p> Signup and view all the answers

What is the most appropriate metric for evaluating the incident notification process?

<p>Elapsed time between detection, reporting, and response</p> Signup and view all the answers

What is the primary objective of performing a post-incident review?

<p>Re-evaluate the impact of the incident and identify areas for improvement</p> Signup and view all the answers

What is the greatest value provided by a Security Information and Event Management (SIEM) system?

<p>Facilitating the monitoring of risk occurrences</p> Signup and view all the answers

Which is the best technical defense against unauthorized access to a corporate network through social engineering?

<p>Multi-factor authentication (MFA)</p> Signup and view all the answers

What is the most important factor for an effective information security program?

<p>Senior management support</p> Signup and view all the answers

What is the best type of indicator for an information security status report for management?

<p>Key risk indicators (KRIs)</p> Signup and view all the answers

What is the primary focus of a Security Information and Event Management (SIEM) system?

<p>Monitoring of risk occurrences</p> Signup and view all the answers

What is the primary responsibility of an information security manager implementing multi-factor authentication (MFA)?

<p>Defending against unauthorized access through social engineering</p> Signup and view all the answers

What is the primary benefit of maintaining a repository base of security policies?

<p>Providing easy access to security policies</p> Signup and view all the answers

What is the most appropriate factor for evaluating the incident notification process?

<p>Elapsed time between detection, reporting, and response</p> Signup and view all the answers

What is the primary role of multi-factor authentication (MFA) in information security?

<p>Defending against unauthorized access through social engineering</p> Signup and view all the answers

What is the most appropriate metric for evaluating the incident notification process?

<p>Elapsed time between detection, reporting, and response</p> Signup and view all the answers

What is spoofing commonly used for in cybersecurity?

<p>Gaining unauthorized access to secure systems by faking the sender's address</p> Signup and view all the answers

How can spoofing trusted email addresses be exploited by attackers?

<p>Sending phishing emails containing malicious links or attachments</p> Signup and view all the answers

What is the primary objective of a business impact analysis (BIA) in cybersecurity?

<p>Determining recovery priorities</p> Signup and view all the answers

What does an incident response plan include instructions for?

<p>Detecting, responding to, and recovering from security incidents</p> Signup and view all the answers

Who may be part of the incident response team?

<p>Security analysts, IT staff, legal counsel, and other stakeholders</p> Signup and view all the answers

What is the primary purpose of an information security status report for management?

<p>Include a list of recent security events and key risk indicators (KRIs)</p> Signup and view all the answers

What does a business impact analysis (BIA) help identify and analyze?

<p>Potential incident effects on the organization, including financial, operational, and reputational impacts</p> Signup and view all the answers

What are key aspects of an incident response plan that the response team needs to be familiar with?

<p>Communication protocols, incident classification, and incident review processes</p> Signup and view all the answers

How can incident response plan execution be facilitated?

<p>By ensuring the response team is trained on the plan</p> Signup and view all the answers

What is the primary focus of a balanced scorecard in the context of information security programs?

<p>Balancing the performance of the security program across multiple perspectives</p> Signup and view all the answers

What does an incident response plan include instructions for?

<p>Detecting, responding to, and recovering from security incidents</p> Signup and view all the answers

What does an incident response plan include instructions for?

<p>Detecting, responding to, and recovering from security incidents</p> Signup and view all the answers

What is the most important consideration when defining a recovery strategy in a business continuity plan (BCP)?

<p>The organizational tolerance to service interruption</p> Signup and view all the answers

What is the best way to reduce the risk associated with a bring your own device (BYOD) program?

<p>Implement a mobile device policy and standard, including guidelines and rules regarding the use of mobile devices and requirements for secure mobile device practices</p> Signup and view all the answers

What is the primary basis for a severity hierarchy for information security incident classification?

<p>The adverse effects on the business</p> Signup and view all the answers

Why should spoofing be prevented in information security?

<p>It may be used to gain illegal entry to a secure system by faking the sender's address</p> Signup and view all the answers

What is the best approach to incident response for an organization migrating to a cloud-based solution?

<p>Revise incident response procedures to encompass the cloud environment</p> Signup and view all the answers

What is the primary basis for determining the value of assets in information security governance?

<p>The business cost when assets are not available</p> Signup and view all the answers

What is the best way to integrate information security governance into enterprise governance?

<p>By establishing an information security steering committee</p> Signup and view all the answers

What is the most important security consideration when granting remote access to confidential information to a vendor for analytic purposes?

<p>The vendor must agree to the organization's information security policy</p> Signup and view all the answers

What should the information security manager's first step be to ensure the security policy framework encompasses a new business model?

<p>Perform a gap analysis</p> Signup and view all the answers

What is the best security process to prevent the exploitation of system vulnerabilities?

<p>Regularly updating and applying patches</p> Signup and view all the answers

What is the best support for information security management in the event of organizational changes in security personnel?

<p>Current documentation of security processes</p> Signup and view all the answers

What is the most important to include in a post-incident review following a data breach?

<p>Evaluations of the adequacy of existing controls</p> Signup and view all the answers

Who is responsible for determining the initial recovery time objective (RTO) in a business impact analysis (BIA)?

<p>The business continuity coordinator</p> Signup and view all the answers

What is the first action an information security manager should take when an employee reports the loss of a personal mobile device containing corporate information?

<p>Initiating incident response</p> Signup and view all the answers

What is the best way to ensure that security is integrated during application development?

<p>Providing training on secure development practices to programmers</p> Signup and view all the answers

What is the best way to ensure a disaster recovery plan can be carried out in an emergency?

<p>Requiring disaster recovery documentation to be stored with all key decision makers</p> Signup and view all the answers

What is the most effective way to help staff members understand their responsibilities for information security?

<p>Requiring staff to participate in information security awareness training</p> Signup and view all the answers

What is the most helpful approach for properly scoping the security assessment of an existing vendor?

<p>Reviewing controls listed in the vendor contract</p> Signup and view all the answers

What is not the best way to ensure a disaster recovery plan can be carried out in an emergency?

<p>Storing disaster recovery documentation in a public cloud</p> Signup and view all the answers

What is not the most helpful approach for properly scoping the security assessment of an existing vendor?

<p>Focusing the review on the infrastructure with the highest risk</p> Signup and view all the answers

What would provide the MOST useful information for planning purposes when preparing an action plan to achieve compliance with local regulatory requirements by an established deadline?

<p>Results from a gap analysis</p> Signup and view all the answers

What is the primary purpose of a gap analysis in the context of compliance planning?

<p>To identify potential areas for improvement</p> Signup and view all the answers

What does a gap analysis help to prioritize in the context of compliance planning?

<p>Actions needed to close the gaps</p> Signup and view all the answers

Which assessment process compares actual performance with expected performance to identify areas for improvement in compliance planning?

<p>Gap analysis</p> Signup and view all the answers

What is the PRIMARY objective of performing a vulnerability assessment following a business system update?

<p>Review the effectiveness of controls</p> Signup and view all the answers

Which of the following is the PRIMARY objective of incident triage?

<p>Categorization of events</p> Signup and view all the answers

Which of the following should an information security manager do FIRST after a new cybersecurity regulation has been introduced?

<p>Consult corporate legal counsel</p> Signup and view all the answers

Which of the following is the BEST justification for making a revision to a password policy?

<p>A risk assessment</p> Signup and view all the answers

What is the PRIMARY benefit of conducting a risk assessment?

<p>Evaluating potential threats and vulnerabilities</p> Signup and view all the answers

What is the GREATEST risk of blindly following a vendor recommendation for password policy?

<p>Exposure to new vulnerabilities</p> Signup and view all the answers

Which of the following is the MOST important reason to conduct interviews as part of the business impact analysis (BIA) process?

<p>To identify and analyze impacts on business functions</p> Signup and view all the answers

What is the primary purpose for continuous monitoring of security controls?

<p>To review the effectiveness of controls</p> Signup and view all the answers

What justifies continued investment in an information security program?

<p>A risk assessment</p> Signup and view all the answers

What is the main focus of security metrics in the context of information security program effectiveness?

<p>Reviewing the effectiveness of controls</p> Signup and view all the answers

What is the primary responsibility of security policy provisions in an organization's information security governance framework?

<p>To provide guidance and direction</p> Signup and view all the answers

What is the BEST way to enable an organization to enhance its incident response plan processes and procedures?

<p>Conducting a risk assessment</p> Signup and view all the answers

What is the best evidence of alignment between corporate and information security governance?

<p>Senior management sponsorship</p> Signup and view all the answers

What should an information security team do upon discovering users sharing a login account in violation of access policy?

<p>Present the risk to senior management</p> Signup and view all the answers

What is the best way to assess the risk associated with using a Software as a Service (SaaS) vendor?

<p>Verify that information security requirements are included in the contract</p> Signup and view all the answers

What is the greatest concern from a penetration test against an organization's external web application?

<p>The exploit code for one of the vulnerabilities being publicly available</p> Signup and view all the answers

What is the best reason to conduct a social engineering test in a call center?

<p>Identify candidates for additional security training and assess staff awareness and skills in recognizing and resisting social engineering attacks</p> Signup and view all the answers

What is the best way to ensure timely and reliable access to services?

<p>Availability</p> Signup and view all the answers

What is the primary focus of business impact analysis (BIA)?

<p>Identify critical processes and assets that need protection</p> Signup and view all the answers

What is the best way to evaluate the appropriateness of controls currently in place?

<p>Define the security policy</p> Signup and view all the answers

What should a multinational organization's chief information security officer (CISO) be most concerned with?

<p>Developing a security program that meets global and regional requirements</p> Signup and view all the answers

What does compliance with regulatory requirements involve, in addition to considering deadlines and penalties for noncompliance?

<p>Understanding how to achieve compliance and what actions are needed</p> Signup and view all the answers

What does an inventory of security controls in place help assess?

<p>The current compliance state</p> Signup and view all the answers

What is the best evidence of successful alignment between corporate and information security governance?

<p>Senior management sponsorship</p> Signup and view all the answers

What is the best way to ensure an organization's risk appetite is considered as part of the risk treatment process?

<p>Establishing key risk indicators (KRIs)</p> Signup and view all the answers

What is the primary benefit of introducing a single point of administration in network monitoring?

<p>It allows administrative staff to make management decisions</p> Signup and view all the answers

What is the primary reason to create and externally store the disk hash value during forensic data acquisition from a hard disk?

<p>To validate the integrity during analysis</p> Signup and view all the answers

What is the primary responsibility of security policy provisions in aligning the information security governance framework with business strategy and objectives?

<p>To ensure that a new server is appropriately secured</p> Signup and view all the answers

What is the primary focus of risk management?

<p>To establish key risk indicators (KRIs)</p> Signup and view all the answers

What is the primary purpose for continuous monitoring of security controls?

<p>To detect and respond to security incidents</p> Signup and view all the answers

What is the primary focus of a Security Information and Event Management (SIEM) system?

<p>To detect and respond to security incidents</p> Signup and view all the answers

What is the primary purpose of security metrics in an information security program?

<p>To measure and track the effectiveness of security controls</p> Signup and view all the answers

What is the primary focus of performance in an organizational context?

<p>To achieve organizational objectives efficiently and effectively</p> Signup and view all the answers

What is the primary responsibility of an information security manager in an organization implementing the use of company-owned mobile devices?

<p>To ensure that information is protected against unauthorized disclosure</p> Signup and view all the answers

What is the primary objective of performing a post-incident review?

<p>To identify areas for improvement in the incident response process</p> Signup and view all the answers

What is the primary focus of security metrics in the context of information security program effectiveness?

<p>To measure and track the effectiveness of security controls</p> Signup and view all the answers

What is the best course of action for an information security manager in the event of a serious vulnerability in a cloud application?

<p>Report the situation to the business owner of the application</p> Signup and view all the answers

What is the most effective indication of an information security awareness training program?

<p>An increase in the identification rate during phishing simulations</p> Signup and view all the answers

In the development of an information security strategy, whose input is of greatest importance?

<p>Process owners</p> Signup and view all the answers

What is the best way to monitor for advanced persistent threats (APTs)?

<p>Search for anomalies in the environment, such as unusual network traffic or user behavior</p> Signup and view all the answers

What is the most important factor to consider when determining asset valuation?

<p>The potential business loss</p> Signup and view all the answers

What is the first step in developing an information security strategy?

<p>Perform a gap analysis based on the current state</p> Signup and view all the answers

In the context of developing an information security strategy, what provides the most useful input to determine the organization's information security strategy?

<p>Laws and regulations</p> Signup and view all the answers

What should an information security manager do when believing that information has been classified inappropriately?

<p>Refer the issue to internal audit for a recommendation</p> Signup and view all the answers

What is the most important consideration for an information security manager when developing a multi-year plan?

<p>Ensure alignment with the plans of other business units</p> Signup and view all the answers

What is the best action for an information security manager in the context of developing a multi-year plan?

<p>Ensure alignment with the plans of other business units</p> Signup and view all the answers

What is the best way to eradicate threats and restore secure systems in incident response?

<p>Eradication is the best way</p> Signup and view all the answers

What is the best way to identify the effectiveness of an information security awareness training program?

<p>An increase in the identification rate during phishing simulations</p> Signup and view all the answers

What is the GREATEST challenge with assessing emerging risk in an organization?

<p>Incomplete identification of threats</p> Signup and view all the answers

Which of the following would be the BEST way for an information security manager to improve the effectiveness of an organization's information security program?

<p>Collaborate with business and IT functions in determining controls</p> Signup and view all the answers

What is the PRIMARY responsibility of security policy provisions in aligning the information security governance framework with business strategy and objectives?

<p>Guiding the development of security controls</p> Signup and view all the answers

What is the MOST useful for an information security manager when determining the need to escalate an incident to senior management?

<p>Potential impact on operations</p> Signup and view all the answers

What is the most effective way to gain senior management approval of security investments in network infrastructure?

<p>Demonstrating that targeted security controls tie to business objectives</p> Signup and view all the answers

What should be the primary focus when mitigating security risks associated with emerging technologies?

<p>Addressing unknown vulnerabilities</p> Signup and view all the answers

What is the most likely risk scenario to emerge from a supply chain attack?

<p>Loss of customers due to unavailability of products</p> Signup and view all the answers

What must an information security manager assess for change requests?

<p>Impact on information security risk</p> Signup and view all the answers

What is the best approach to make strategic information security decisions?

<p>Establish an information security steering committee</p> Signup and view all the answers

How can effective strategic alignment of security initiatives be facilitated?

<p>Having organizational units contribute to and agree on priorities</p> Signup and view all the answers

What is the most important aspect when conducting a forensic investigation?

<p>Maintaining a chain of custody</p> Signup and view all the answers

What is the most effective measure in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application?

<p>A patch management process</p> Signup and view all the answers

What are some reference materials for information security management?

<p>Certified Information Security Manager (CISM) Study Manual and various ISACA resources and journals</p> Signup and view all the answers

What does the CISM Study Manual emphasize the importance of?

<p>Tying security controls to business objectives</p> Signup and view all the answers

What does the information security steering committee provide oversight and guidance on?

<p>Security policies, strategies, and technology implementation</p> Signup and view all the answers

What does effective strategic alignment of security initiatives involve?

<p>Alignment with business goals, collaboration between units, and prioritization based on risk and value</p> Signup and view all the answers

What is the primary objective of the information security incident response process?

<p>To minimize negative impact to critical operations</p> Signup and view all the answers

What is the first step to gain approval for outsourcing to address a security gap?

<p>Developing a cost-benefit analysis</p> Signup and view all the answers

How should an information security manager determine the comprehensiveness of an organization's information security strategy?

<p>By conducting an internal security audit</p> Signup and view all the answers

What should the information security manager recommend as the first step when an organization wants to implement a new standard related to an emerging technology?

<p>Perform a risk assessment on the new technology</p> Signup and view all the answers

What is the best security control for an organization that permits the storage and use of its critical and sensitive information on employee-owned smartphones?

<p>Establishing the authority to remote wipe</p> Signup and view all the answers

How can senior management's concern about the organization's intrusion prevention system (IPS) repeatedly disrupting business operations be addressed?

<p>By decreasing false positives</p> Signup and view all the answers

What is the main benefit of implementing a data loss prevention (DLP) solution?

<p>To eliminate the risk of data loss</p> Signup and view all the answers

What should an organization do to maintain legally admissible evidence?

<p>Have documented processes around forensic records retention</p> Signup and view all the answers

What should the security control for an organization allowing the storage of critical information on employee-owned smartphones align with?

<p>The organization's overall security strategy</p> Signup and view all the answers

What should the information security manager prioritize before adopting new technology standards?

<p>Risk assessment</p> Signup and view all the answers

What should be done to ensure minimal disruption to business operations caused by the organization's intrusion prevention system (IPS)?

<p>Tune the IPS to reduce false positives</p> Signup and view all the answers

What should the implementation of a data loss prevention (DLP) solution complement?

<p>An organization's overall security controls and strategies</p> Signup and view all the answers

What is crucial for maintaining legally admissible evidence and preventing tampering or loss?

<p>Chain of custody forms with points of contact</p> Signup and view all the answers

What is NOT sufficient to maintain legally admissible evidence?

<p>Robust legal framework and notes of legal actions</p> Signup and view all the answers

What is NOT sufficient for maintaining legally admissible evidence?

<p>Technical actions alone</p> Signup and view all the answers

After learning of a data breach at the organization's hosted payroll service provider, what should the information security manager FIRST do?

<p>Validate the breach with the provider</p> Signup and view all the answers

What should the outsourcing agreement for disaster recovery activities MOST importantly include?

<p>Disaster recovery communication plan</p> Signup and view all the answers

What is MOST important for effective risk decision making?

<p>Established risk domains</p> Signup and view all the answers

What is the GREATEST concern resulting from the lack of severity criteria in incident classification?

<p>Ineffective escalation procedures</p> Signup and view all the answers

What is NOT the GREATEST concern resulting from the lack of severity criteria in incident classification?

<p>Timely detection of attacks being impossible</p> Signup and view all the answers

How should an organization test for the existence of backdoors in a mission-critical business application?

<p>Scan the entire application using a vulnerability scanning tool</p> Signup and view all the answers

What can lead to ineffective escalation procedures due to its absence?

<p>Lack of severity criteria in incident classification</p> Signup and view all the answers

What is the MOST effective course of action to test for the existence of backdoors in a mission-critical business application?

<p>Scan the entire application using a vulnerability scanning tool</p> Signup and view all the answers

What should the information security manager FIRST do when an employee reports the loss of a personal mobile device containing corporate information?

<p>Validate the breach with the provider</p> Signup and view all the answers

What is the primary benefit to an organization that maintains an information security governance framework?

<p>Managing business risks to an acceptable level</p> Signup and view all the answers

What is the best evidence of alignment of information security governance with corporate governance?

<p>Average return on investment (ROI) associated with security initiatives</p> Signup and view all the answers

What is the first course of action for an information security manager upon discovering an HVAC vendor with remote access to stores?

<p>Reviewing the vendor contract</p> Signup and view all the answers

What enables an informed decision by senior management when developing a business case to justify an information security investment?

<p>Results of a risk assessment</p> Signup and view all the answers

What is the primary benefit of maintaining an information security governance framework?

<p>Managing business risks to an acceptable level</p> Signup and view all the answers

What should an information security manager's first course of action be when discovering an HVAC vendor with remote access to stores?

<p>Reviewing the vendor contract</p> Signup and view all the answers

What is the primary benefit of maintaining a repository base of security policies?

<p>Communicating information security guidelines across the enterprise</p> Signup and view all the answers

What is the primary focus of risk management?

<p>Managing business risks to an acceptable level</p> Signup and view all the answers

What is the primary benefit of conducting an organization-wide security awareness program?

<p>Communicating information security guidelines across the enterprise</p> Signup and view all the answers

What is the primary purpose of an information security status report for management?

<p>Measuring the effectiveness of security controls</p> Signup and view all the answers

What is the primary responsibility of security policy provisions in aligning the information security governance framework with business strategy and objectives?

<p>Aligning with business strategy and objectives</p> Signup and view all the answers

What is the best evidence of alignment of information security governance with corporate governance?

<p>Average return on investment (ROI) associated with security initiatives</p> Signup and view all the answers

What is MOST useful to an information security manager when conducting a post-incident review of an attack?

<p>Method of operation used by the attacker</p> Signup and view all the answers

When is penetration testing MOST appropriate?

<p>New system is about to go live</p> Signup and view all the answers

What is the PRIMARY reason to perform regular reviews of the cybersecurity threat landscape?

<p>To compare emerging trends with the existing organizational security posture</p> Signup and view all the answers

Which desired outcome BEST supports a decision to invest in a new security initiative?

<p>Reduction of organizational risk</p> Signup and view all the answers

What is the PRIMARY goal of the eradication phase in an incident response process?

<p>Remove the threat and restore affected systems</p> Signup and view all the answers

In the development of a request for proposal (RFP) for a new outsourced service, what should the security manager PRIMARILY focus on defining?

<p>Security requirements for the process being outsourced</p> Signup and view all the answers

Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?

<p>Management support</p> Signup and view all the answers

What should be considered FIRST when recovering a compromised system that needs a complete rebuild?

<p>Configuration management files</p> Signup and view all the answers

Who is BEST suited to determine how the information in a database should be classified?

<p>Data owner</p> Signup and view all the answers

Which of the following roles is BEST able to influence the security culture within an organization?

<p>Chief information security officer (CISO)</p> Signup and view all the answers

What is the GREATEST responsibility of security policy provisions in aligning the information security governance framework with business strategy and objectives?

<p>Defining security requirements</p> Signup and view all the answers

What is the PRIMARY focus of risk management?

<p>Identifying and mitigating potential risks</p> Signup and view all the answers

What is the PRIMARY purpose of an information security status report for management?

<p>Providing an overview of the organization's security posture</p> Signup and view all the answers

What BEST enables the integration of information security governance into corporate governance?

<p>Defining security requirements</p> Signup and view all the answers

What should the information security manager FIRST do when an employee reports the loss of a personal mobile device containing corporate information?

<p>Activate remote wipe capabilities</p> Signup and view all the answers

What is the BEST way to evaluate the appropriateness of controls currently in place?

<p>Conduct a security audit</p> Signup and view all the answers

What is the balanced scorecard primarily used for in the context of information security strategy?

<p>Demonstrating alignment with business objectives</p> Signup and view all the answers

What is the strongest justification for granting an exception to the security policy on USB storage devices?

<p>Benefit outweighs potential risk</p> Signup and view all the answers

What is a potential benefit of USB storage devices according to the text?

<p>Data mobility and backup</p> Signup and view all the answers

What is a potential security risk associated with USB storage devices?

<p>Introducing malware</p> Signup and view all the answers

What is NOT considered a strong justification for granting an exception to the security policy on USB storage devices?

<p>Enabling USB based on user roles</p> Signup and view all the answers

What should an exception to a security policy be justified by?

<p>Clear and compelling reason</p> Signup and view all the answers

When can USB storage devices be granted an exception according to the text?

<p>If the benefit is greater than potential risk</p> Signup and view all the answers

What should incident response teams document during the containment phase of incident response?

<p>Actions required to remove the threat</p> Signup and view all the answers

What is NOT a potential security risk posed by USB storage devices?

<p>Access restricted to read-only</p> Signup and view all the answers

What is NOT a potential benefit of USB storage devices according to the text?

<p>Access restricted to read-only</p> Signup and view all the answers

What is the primary focus of justifying an exception to a security policy according to the text?

<p>Clear and compelling reason</p> Signup and view all the answers

What is the primary responsibility of incident response teams during the containment phase?

<p>Documenting actions required to remove the threat</p> Signup and view all the answers

What should an organization prioritize when aligning a security awareness program with the business strategy?

<p>People and culture</p> Signup and view all the answers

What is the primary focus of security risk assessment?

<p>Identifying potential threats and vulnerabilities</p> Signup and view all the answers

What should an organization do when considering replacing desktop computers with tablets for shift-based staff?

<p>Conduct a mobile device risk assessment</p> Signup and view all the answers

What is the best course of action for an information security manager regarding leveraging social network platforms?

<p>Assess the security risk associated with their use</p> Signup and view all the answers

What should an organization prioritize when developing security controls for the use of social networks?

<p>Results of security risk assessment and alignment with the organization's risk appetite</p> Signup and view all the answers

What is essential to ensure when aligning information security with the organization's strategy?

<p>Prioritizing business goals and protecting critical assets</p> Signup and view all the answers

What is involved in security risk assessment?

<p>Identifying, analyzing, and evaluating potential threats and vulnerabilities</p> Signup and view all the answers

What is the primary consideration before establishing processes to publish content on social networks?

<p>Assessing security risk and implementing necessary controls</p> Signup and view all the answers

What may not be feasible or effective in the context of social network platforms?

<p>Conducting vulnerability assessments</p> Signup and view all the answers

What should the information security manager do to support leveraging social network platforms?

<p>Report the decision to the compliance officer and update details within the risk register</p> Signup and view all the answers

What is the primary basis for an information security strategy?

<p>The organization's vision and mission</p> Signup and view all the answers

What do key risk indicators (KRIs) provide?

<p>Early warnings of potential exposure to risk</p> Signup and view all the answers

What is the most important factor when deciding the level of protection for an information asset?

<p>The asset's importance to the organization's operations</p> Signup and view all the answers

What is the best indication of information security strategy alignment with the organization's objectives?

<p>The number of business objectives directly supported by information security initiatives</p> Signup and view all the answers

What is the most important detail to capture in an organization's risk register?

<p>The risk ownership</p> Signup and view all the answers

What is the best analysis to identify the external influences to an organization's information security?

<p>Threat analysis</p> Signup and view all the answers

What is the most important factor to obtain senior leadership support when presenting an information security strategy?

<p>The strategy aligns with management's acceptable level of risk</p> Signup and view all the answers

What should an organization planning to leverage popular social network platforms to promote its products and services do?

<p>Conduct a risk assessment and implement appropriate controls to manage the associated risks</p> Signup and view all the answers

What is crucial when obtaining support for an information security program?

<p>Ensuring that all stakeholders understand the importance of information security and the associated risks</p> Signup and view all the answers

What should an organization capture in its risk register to ensure risks are actively managed?

<p>Risk ownership</p> Signup and view all the answers

What should the information security strategy align with to obtain senior leadership support?

<p>Management's acceptable level of risk</p> Signup and view all the answers

What should an organization do to promote its products and services on popular social network platforms?

<p>Conduct a risk assessment and implement appropriate controls to manage the associated risks</p> Signup and view all the answers

What is important to capture in an organization's risk register?

<p>Risk ownership</p> Signup and view all the answers

What is the best approach to obtain support for a new organization-wide information security program?

<p>Ensuring that all stakeholders understand the importance of information security and the associated risks</p> Signup and view all the answers

Which of the following should include contact information for representatives of equipment and software vendors?

<p>Business continuity plan (BCP)</p> Signup and view all the answers

What is the BEST way to demonstrate that an information security program provides appropriate coverage?

<p>Maturity assessment</p> Signup and view all the answers

What is the best action for the system admin manager to address the issue of negligent handling of incident alerts by system admins?

<p>Provide incident response training to data custodians</p> Signup and view all the answers

What is the PRIMARY purpose of an information security status report for management?

<p>To communicate the effectiveness of security controls</p> Signup and view all the answers

What is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?

<p>Data classification</p> Signup and view all the answers

What is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to users with administrative privileges?

<p>Increased accountability</p> Signup and view all the answers

What is the BEST way for the information security manager to help senior management understand the related risk of unpatched software on user workstations?

<p>Include the impact of the risk as part of regular metrics</p> Signup and view all the answers

Information security controls should be designed PRIMARILY based on:

<p>business risk scenarios</p> Signup and view all the answers

Labeling information according to its security classification:

<p>enhances the likelihood of people handling information securely</p> Signup and view all the answers

Management decisions concerning information security investments will be MOST effective when they are based on:

<p>the reporting of consistent and periodic assessments of risks</p> Signup and view all the answers

An information security manager has been tasked with developing materials to update the board, regulatory agencies, and the media about a security incident. What should the information security manager do FIRST?

<p>Determine the needs and requirements of each audience</p> Signup and view all the answers

What is the BEST justification for making a revision to a password policy?

<p>Change in regulatory requirements</p> Signup and view all the answers

What is the process of establishing and maintaining a framework to provide assurance that information security strategies are aligned with and support business objectives, consistent with applicable laws and regulations, and managed effectively and efficiently?

<p>Security governance</p> Signup and view all the answers

What is the primary reason to create and externally store the disk hash value during forensic data acquisition from a hard disk?

<p>To verify the integrity of the acquired data</p> Signup and view all the answers

What is the primary purpose for continuous monitoring of security controls?

<p>To identify security control weaknesses</p> Signup and view all the answers

What should an organization capture in its risk register to ensure risks are actively managed?

<p>All identified risks</p> Signup and view all the answers

What is the best tool to monitor the effectiveness of information security governance?

<p>Balanced Scorecard</p> Signup and view all the answers

Who is the most appropriate person to own the risk associated with the failure of a privileged access control?

<p>Business Owner</p> Signup and view all the answers

During the initiation phase of the system development life cycle (SDLC) for a software project, what should information security activities address?

<p>Baseline security controls</p> Signup and view all the answers

What is the most important element in achieving executive commitment to an information security governance program?

<p>Aligning the program with identified business drivers</p> Signup and view all the answers

To minimize the risk of data exposure when a user reports a stolen personal mobile device storing sensitive corporate data, what is the best action?

<p>Wipe the device remotely</p> Signup and view all the answers

What is the most helpful for aligning security operations with the IT governance framework?

<p>Security operations program</p> Signup and view all the answers

What are Recovery Time Objectives (RTOs) an output of?

<p>Business Impact Analysis (BIA)</p> Signup and view all the answers

What does a Business Continuity Plan (BCP) describe?

<p>Strategies and procedures for ensuring the continuity of critical business functions or processes</p> Signup and view all the answers

What does a Disaster Recovery Plan (DRP) describe?

<p>Technical steps and resources for restoring IT systems and data</p> Signup and view all the answers

What are important elements for aligning security operations with the IT governance framework?

<p>Information security policy and security risk assessment</p> Signup and view all the answers

What is a Service Level Agreement (SLA) not an output of?

<p>Business Impact Analysis (BIA)</p> Signup and view all the answers

What is the best action to take during an active attack to prevent further access and limit the attack scope?

<p>Not dumping event logs and not shutting off all network access points</p> Signup and view all the answers

What is the ultimate accountability of business data owners in the event of an information security incident at a third-party provider?

<p>They are responsible for data loss</p> Signup and view all the answers

Who is responsible for implementing and enforcing security policies and standards, but not accountable for data loss at a third-party provider?

<p>Information security manager</p> Signup and view all the answers

What is the best evidence to senior management that security control performance has improved?

<p>Review of security metrics trends</p> Signup and view all the answers

Who is the most appropriate role to determine access rights for specific users of an application?

<p>Data owner</p> Signup and view all the answers

What is the primary responsibility of the incident response team?

<p>Managing incidents according to the incident response plan</p> Signup and view all the answers

What is the primary purpose of security metrics in the context of information security program effectiveness?

<p>Measuring and demonstrating the effectiveness and efficiency of security controls over time</p> Signup and view all the answers

What is the best course of action when an online company discovers a network attack in progress?

<p>Isolate the affected network segment</p> Signup and view all the answers

What is NOT recommended in response to an ongoing network attack?

<p>Isolating the affected network segment</p> Signup and view all the answers

What is the responsibility of an information security manager on the change management committee?

<p>To advise on change-related risk</p> Signup and view all the answers

Who is responsible for providing incident response training to data owners?

<p>Not advisable to provide incident response training to data owners</p> Signup and view all the answers

Who is ultimately accountable for data loss at a third-party provider?

<p>Business data owners</p> Signup and view all the answers

What is the responsibility of the service provider hosting the data in the event of data loss?

<p>Not accountable for data loss</p> Signup and view all the answers

What is the primary objective of performing a post-incident review?

<p>To identify the root cause of the incident and develop corrective actions</p> Signup and view all the answers

What is the most critical aspect when creating an incident response plan?

<p>Identifying what constitutes an incident</p> Signup and view all the answers

What is the most effective way to mitigate the risk of external brute force attacks on critical systems?

<p>Implementing multi-factor authentication</p> Signup and view all the answers

What has the greatest positive impact on the ability to execute the disaster recovery plan (DRP)?

<p>Periodic updating of the DRP</p> Signup and view all the answers

What should the information security manager review first when an organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor?

<p>Independent security assessment reports for each vendor</p> Signup and view all the answers

What is the first step before conducting full-functional continuity testing?

<p>Verify that teams and individuals responsible for recovery have been identified and trained</p> Signup and view all the answers

What is the best way to obtain senior management support for an information security governance program?

<p>Demonstrate the program's value to the organization</p> Signup and view all the answers

What does the Service Level Agreement (SLA) define?

<p>Expectations and obligations between a service provider and consumer</p> Signup and view all the answers

What is the most critical factor in protecting an enterprise from advanced persistent threats (APTs)?

<p>Implementing multi-layered defense mechanisms</p> Signup and view all the answers

What is the primary purpose of security metrics in an information security program?

<p>To provide a quantitative measure of the effectiveness of security controls</p> Signup and view all the answers

What is the primary responsibility of an information security manager implementing multi-factor authentication (MFA)?

<p>Enhancing the security of authentication processes</p> Signup and view all the answers

What is the primary purpose of continuous monitoring of security controls?

<p>To detect and respond to security breaches in real-time</p> Signup and view all the answers

What is the BEST method to evaluate the effectiveness of an alternate processing site when continuous uptime is required?

<p>Parallel test</p> Signup and view all the answers

From an information security perspective, legal issues associated with a transborder flow of technology-related items are MOST often related to:

<p>Encryption tools and personal data</p> Signup and view all the answers

Which of the following BEST indicates that information security governance and corporate governance are integrated?

<p>The information security steering committee is composed of business leaders</p> Signup and view all the answers

What is the MOST effective way to mitigate the risk of external brute force attacks on critical systems?

<p>Implementing strong password policies</p> Signup and view all the answers

What is the primary purpose of a risk register in cybersecurity risk management?

<p>To record and track identified risks, their likelihood, impact, mitigation strategies, and status</p> Signup and view all the answers

Why is it crucial for categorization methods for security incidents to have agreed-upon definitions?

<p>To ensure a common understanding and communication among the incident response team and other stakeholders</p> Signup and view all the answers

What is the primary purpose of Key Performance Indicators (KPIs) in cybersecurity risk management?

<p>To help senior management understand the status of information security compliance</p> Signup and view all the answers

What is the contribution of recovery point objective (RPO) to disaster recovery?

<p>To define backup strategy by determining the maximum amount of acceptable data loss</p> Signup and view all the answers

What is the primary role of cybersecurity policies in an organization?

<p>Provide the foundation for developing and implementing cybersecurity strategies, plans, procedures, standards, and guidelines</p> Signup and view all the answers

In the context of risk treatment, what does 'mitigate' mean?

<p>Applying risk treatment option to reduce the impact or probability of a risk</p> Signup and view all the answers

What is the best approach for managing user access permissions to ensure alignment with data classification?

<p>Review access permissions annually or whenever job responsibilities change</p> Signup and view all the answers

What is the primary reason to monitor key risk indicators related to information security?

<p>To benchmark control performance</p> Signup and view all the answers

What is the first step when establishing a new data protection program that must comply with applicable data privacy regulations?

<p>Create an inventory of systems where personal data is stored</p> Signup and view all the answers

What is the most important message to convey to employees in building a security risk-aware culture?

<p>The responsibility for security rests with all employees</p> Signup and view all the answers

Who is responsible for determining the RTOs for critical processes and systems in Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) teams?

<p>Business continuity officers</p> Signup and view all the answers

What is the primary reason for granting a security exception?

<p>Justified by the benefit to the business</p> Signup and view all the answers

What is the best way to ensure an information security training program is most effective?

<p>Base its contents on employees' roles</p> Signup and view all the answers

What is the best way to manage user access permissions to ensure alignment with data classification?

<p>Review access permissions annually or whenever job responsibilities change</p> Signup and view all the answers

What is the primary role of the Federal Emergency Management Agency (FEMA) in determining RTOs?

<p>Supports the role of BCP and DRP teams in determining RTOs</p> Signup and view all the answers

What is the primary responsibility of Recovery Time Objectives (RTOs) determination?

<p>Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) teams</p> Signup and view all the answers

What is the best approach for managing user access permissions to ensure alignment with data classification?

<p>Review access permissions annually or whenever job responsibilities change</p> Signup and view all the answers

What is the primary reason to benchmark control performance by monitoring key risk indicators related to information security?

<p>To benchmark control performance</p> Signup and view all the answers

What is the primary basis for determining Recovery Time Objectives (RTOs) according to the text?

<p>Criticality of business functions and maximum acceptable outage</p> Signup and view all the answers

What is the most effective way to communicate forward-looking trends within security reporting according to the text?

<p>Key performance indicators (KPIs)</p> Signup and view all the answers

What is crucial to ensure alignment with corporate governance objectives and legal and regulatory requirements according to the text?

<p>Senior management review and approval of an information security strategic plan</p> Signup and view all the answers

What is the most important consideration for ensuring procurement decisions consider information security concerns when using Software as a Service (SaaS) according to the text?

<p>Integrating information security risk assessments into the procurement process</p> Signup and view all the answers

What provides the most comprehensive insight into ongoing threats facing an organization according to the text?

<p>A risk register</p> Signup and view all the answers

What is the most important way to communicate the effectiveness of an information security governance framework to stakeholders according to the text?

<p>Establishing metrics for each milestone</p> Signup and view all the answers

What is the most important for confirming third-party provider compliance with an organization's information security requirements according to the text?

<p>Including the right to audit in the service level agreement (SLA)</p> Signup and view all the answers

What is the most effective for testing applications to avoid unexpected outcomes in production according to the text?

<p>Using real data that accurately reflects characteristics, patterns, and behaviors</p> Signup and view all the answers

What is NOT mentioned in the text as providing the most comprehensive insight into ongoing threats facing an organization?

<p>Business impact analysis (BIA)</p> Signup and view all the answers

What is the most important for ensuring procurement decisions consider information security concerns when using Software as a Service (SaaS) according to the text?

<p>Integrating information security risk assessments into the procurement process</p> Signup and view all the answers

What is most effective for communicating forward-looking trends within security reporting according to the text?

<p>Key performance indicators (KPIs)</p> Signup and view all the answers

What provides the most comprehensive insight into ongoing threats facing an organization according to the text?

<p>A risk register</p> Signup and view all the answers

What is the primary purpose of information asset classification?

<p>Providing a basis for implementing a need-to-know policy</p> Signup and view all the answers

What is the best way to ensure the capability to restore clean data after a ransomware attack?

<p>Maintain multiple offline backups</p> Signup and view all the answers

What is the primary concern raised by privileged employee access requests to production servers being approved without user actions being logged?

<p>Lack of accountability</p> Signup and view all the answers

What is the primary benefit of information security culture being successful?

<p>End users can identify and report incidents</p> Signup and view all the answers

What is the first step when a new vulnerability affecting key data processing systems is identified?

<p>Re-evaluate the risk associated with the vulnerability</p> Signup and view all the answers

What is the primary purpose of a firewall in information security?

<p>Monitor and filter network traffic</p> Signup and view all the answers

What is the main objective of mitigation in information security management?

<p>Lessen the negative effects of a risk</p> Signup and view all the answers

What does a vulnerability represent in the context of information security?

<p>A weakness that can be exploited by an attacker</p> Signup and view all the answers

What is the indication of a successful information security culture?

<p>End users know how to identify and report incidents</p> Signup and view all the answers

What is the initial course of action for an information security manager when a newly introduced privacy regulation affects the business?

<p>Identify and assess the risk in the context of business objectives</p> Signup and view all the answers

What does the best way to assess the risk associated with a vulnerability entail?

<p>Re-evaluating the risk associated with the vulnerability</p> Signup and view all the answers

What is the primary support provided by information asset classification?

<p>Providing a basis for implementing a need-to-know policy</p> Signup and view all the answers

What is the MOST important step before classifying a suspected event as a security incident?

<p>Notify the business process owner</p> Signup and view all the answers

What should an information security manager do to address security risks not being treated in a timely manner?

<p>Re-perform risk analysis at regular intervals</p> Signup and view all the answers

What does an email digital signature verify to the recipient?

<p>The authenticity of the sender and message integrity</p> Signup and view all the answers

What is the primary action to take when developing materials to update stakeholders about a security incident?

<p>Provide accurate and timely updates to all stakeholders</p> Signup and view all the answers

What is the best approach for managing user access permissions to ensure alignment with data classification?

<p>Implementing role-based access control (RBAC) to restrict unauthorized access to sensitive data</p> Signup and view all the answers

What is the primary benefit of implementing a vulnerability assessment process?

<p>Enhanced threat management</p> Signup and view all the answers

What is the first step when implementing a security program?

<p>Perform a risk analysis to identify and prioritize potential threats and vulnerabilities</p> Signup and view all the answers

What is the best approach to ensure compliance with information security policy for a new application?

<p>Perform a vulnerability analysis before implementation</p> Signup and view all the answers

What is the most important consideration when establishing an organization's information security governance committee?

<p>Ensuring that members represent functions across the organization</p> Signup and view all the answers

What is the best assurance for applying security policies across business operations?

<p>Documenting organizational standards in operational procedures</p> Signup and view all the answers

What is the primary benefit of introducing a single point of administration in network monitoring?

<p>Centralized control and streamlined management</p> Signup and view all the answers

What is the first step when implementing a security program?

<p>Perform a risk analysis to identify and prioritize potential threats and vulnerabilities</p> Signup and view all the answers

What is the best way to ensure compliance with information security policy for a new application?

<p>Perform a vulnerability analysis before implementation</p> Signup and view all the answers

What is the primary benefit of implementing a vulnerability assessment process?

<p>Enhanced threat management</p> Signup and view all the answers

What is NOT prevented by digital signatures according to the text?

<p>Unauthorized access to email messages</p> Signup and view all the answers

What does an incident response plan need to include criteria for, according to an information security manager?

<p>Escalation</p> Signup and view all the answers

What is the primary objective of a post-incident review of an information security incident?

<p>To prevent recurrence</p> Signup and view all the answers

What is the most important information for influencing management's support of information security?

<p>Demonstration of alignment with the business strategy</p> Signup and view all the answers

Why are threat and vulnerability assessments important?

<p>Because they are the basis for setting control objectives</p> Signup and view all the answers

What is the first step in developing an information security strategy?

<p>To identify key stakeholders to champion information security</p> Signup and view all the answers

What is the next step after establishing that an application has been breached?

<p>To isolate the impacted systems from the rest of the network</p> Signup and view all the answers

What is the information security manager's first course of action after a penetration test conducted by an accredited third party?

<p>To report findings to senior management</p> Signup and view all the answers

What is the best reason for an organization to use Disaster Recovery as a Service (DRaaS)?

<p>To lower the annual cost to the business</p> Signup and view all the answers

To ensure that relevant controls are applied to a project, what is the most helpful action?

<p>Identifying responsibilities during the project business case analysis</p> Signup and view all the answers

What is the best way to support the business case for an increase in the information security budget?

<p>Cost-benefit analysis results</p> Signup and view all the answers

How can IT projects going over budget with too many security controls being added post-production be addressed?

<p>By involving information security at each stage of project management</p> Signup and view all the answers

How would a data classification framework help ensure that relevant controls are applied to a project?

<p>By providing it to stakeholders</p> Signup and view all the answers

What can be used to support the business case for an increase in the information security budget?

<p>Cost-benefit analysis results</p> Signup and view all the answers

What is the best way to justify security budgets and prioritize spending based on expected outcomes?

<p>Performing a cost-benefit analysis</p> Signup and view all the answers

Who is in the best position to evaluate business impacts?

<p>The process manager</p> Signup and view all the answers

What is the most important consideration before classifying a suspected event as a security incident?

<p>Notifying the business process owner</p> Signup and view all the answers

What is the most useful information for a newly hired information security manager developing an information security strategy?

<p>The organization's mission statement and roadmap</p> Signup and view all the answers

When performing a business impact analysis (BIA), what should the business process owner calculate?

<p>Recovery time and cost estimates</p> Signup and view all the answers

What is the best support for incident management in the event of attacks on an organization's supply chain?

<p>Establishing communication paths with vendors</p> Signup and view all the answers

What is the most helpful in determining the criticality of an organization's business functions?

<p>Business impact analysis (BIA)</p> Signup and view all the answers

What is the best for enabling regulatory compliance when employee account privileges need to be removed within a specific timeframe?

<p>Privileged Access Management (PAM) system</p> Signup and view all the answers

What is the best way to incorporate media communication procedures into the security incident communication plan?

<p>Include a single point of contact within the organization</p> Signup and view all the answers

What is the best way to ensure that the rationale for acceptance of information security risks is periodically reviewed in a rapidly changing environment?

<p>Review security-related key risk indicators (KRIs)</p> Signup and view all the answers

What is the best indicator of an organization's information security status?

<p>Controls audit</p> Signup and view all the answers

What is the best way to determine if an information security profile is aligned with business requirements?

<p>Reviewing security-related key risk indicators (KRIs)</p> Signup and view all the answers

What is the primary method to build a robust information security culture in an organization?

<p>Implementing an information security governance framework</p> Signup and view all the answers

What is the primary consideration when responding to a ransomware attack?

<p>Ensuring the business can operate to minimize disruption</p> Signup and view all the answers

What is the best approach to protect newly acquired data assets prior to integration?

<p>Performing a risk assessment</p> Signup and view all the answers

What is the best way to embed the organization's security objectives in business operations?

<p>Implementing an information security governance framework</p> Signup and view all the answers

What is a buffer overflow best described as?

<p>A function being carried out with more data than it can handle, presenting a security risk</p> Signup and view all the answers

What is essential when designing a disaster recovery plan?

<p>Availability of Business Impact Analysis (BIA) results</p> Signup and view all the answers

What is the primary accountability of the data owner in an organization with a customer-facing SaaS application?

<p>Addressing major security vulnerabilities at the primary cloud provider</p> Signup and view all the answers

What is the most important requirement for a successful security program?

<p>Management decision on asset value</p> Signup and view all the answers

What is the best way to achieve compliance with new global regulations related to the protection of personal information?

<p>Determining the current and desired state of controls</p> Signup and view all the answers

What primarily determines the level of protection required for assets?

<p>Asset classification</p> Signup and view all the answers

What is most important for the effective implementation of an information security governance program?

<p>Ensuring program goals are communicated and understood by the organization</p> Signup and view all the answers

What should be completed first when developing an asset classification program?

<p>Creating an inventory</p> Signup and view all the answers

Which of the following has the MOST influence on the inherent risk of an information asset?

<p>Business criticality</p> Signup and view all the answers

A critical server for a hospital has been encrypted by ransomware. Which of the following would MOST effectively allow the hospital to avoid paying the ransom?

<p>A properly tested offline backup system</p> Signup and view all the answers

Which of the following is MOST important to ensure when developing escalation procedures for an incident response plan?

<p>The contact list is regularly updated</p> Signup and view all the answers

Which of the following is MOST important for an information security manager to verify when selecting a third-party forensics provider?

<p>The provider's experience and expertise in digital forensics</p> Signup and view all the answers

What is the best step to take in the event of losing a smartphone with sensitive data?

<p>Remotely wipe the device</p> Signup and view all the answers

What is the best method to protect against advanced persistent threats (APTs)?

<p>Implementing proactive systems monitoring</p> Signup and view all the answers

What primarily simulates real-world attacks when testing controls?

<p>Performing black-box control tests</p> Signup and view all the answers

What results in the most accurate controls assessment?

<p>Mature change management processes</p> Signup and view all the answers

Which action requires the most time to restore data for an application?

<p>Full backup</p> Signup and view all the answers

What should be the information security manager's first course of action when an organization is targeted for a major emerging threat?

<p>Validate the relevance of the information</p> Signup and view all the answers

What should be the first trigger when unknown malware infects an organization's critical system?

<p>Activate the incident response plan</p> Signup and view all the answers

What greatly influences the successful adoption of an information security governance program?

<p>Organizational culture</p> Signup and view all the answers

What is the best approach for governing noncompliance with security requirements?

<p>Base mandatory review and exception approvals on inherent risk</p> Signup and view all the answers

What is the most important action for the information security manager when preventive controls are not feasible?

<p>Managing the impact</p> Signup and view all the answers

What is being implemented when a security information and event management (SIEM) system is installed?

<p>Detective control</p> Signup and view all the answers

What best indicates that information assets are classified accurately?

<p>Appropriate prioritization of information risk treatment</p> Signup and view all the answers

What is the best practice for ensuring the integrity of a recovered system after an intrusion?

<p>Reinstall the OS, patches, and applications from a backup</p> Signup and view all the answers

What is the primary focus of an information security manager during the development of a critical system storing highly confidential data?

<p>Ensuring the amount of residual risk is acceptable</p> Signup and view all the answers

What is the best course of action after a server has been attacked?

<p>Initiate incident response</p> Signup and view all the answers

What is the greatest concern when a risk owner approves exceptions to replace key controls with weaker compensating controls?

<p>Risk levels may be elevated beyond acceptable limits</p> Signup and view all the answers

What is the primary purpose of aligning incident response capability with a public cloud service provider?

<p>Update the incident escalation process</p> Signup and view all the answers

What is the best practice for information security management in a security breach scenario?

<p>Isolating the impacted endpoints</p> Signup and view all the answers

What is the most helpful for determining which information security policies should be implemented by an organization?

<p>Risk assessment</p> Signup and view all the answers

What should an information security manager prioritize when developing a security strategy for a new service subject to regulations?

<p>Perform a gap analysis against the current state</p> Signup and view all the answers

What is the best indication of a mature information security culture?

<p>Staff consistently considering risk in decision-making</p> Signup and view all the answers

What is the primary focus of risk mitigation in information security management?

<p>Improving security controls</p> Signup and view all the answers

What is the most important step prior to conducting a forensic examination?

<p>Create an image of the original data on new media to preserve the evidence</p> Signup and view all the answers

What is the primary reason for integrating the various assurance functions of an organization?

<p>To enable consistent security</p> Signup and view all the answers

What is the best response to increasing cyberattacks?

<p>Revalidating and mitigating risks through a risk assessment and mitigation plan</p> Signup and view all the answers

What is the best viable containment strategy for a distributed denial of service (DDoS) attack?

<p>Redirecting the attacker's traffic</p> Signup and view all the answers

What is the most critical factor for information security governance?

<p>Executive sponsorship and business alignment</p> Signup and view all the answers

What is the purpose of an email digital signature?

<p>To verify the integrity of the email message</p> Signup and view all the answers

What is the best approach to ensure appropriate security controls are built into software?

<p>Providing standards for implementation during development activities</p> Signup and view all the answers

What is the factor with the greatest influence on the successful integration of information security within the business?

<p>Organizational structure and culture</p> Signup and view all the answers

What should be included in the business case for an information security initiative with a difficult ROI calculation?

<p>Estimated reduction in risk</p> Signup and view all the answers

What is the best enabler for staff acceptance of information security policies?

<p>Senior management support</p> Signup and view all the answers

What is the best facilitator for effective incident response testing?

<p>Conducting tabletop exercises</p> Signup and view all the answers

What is the best way to integrate information security into corporate governance?

<p>Effective information security governance</p> Signup and view all the answers

What is the primary benefit of including baseline standards for all locations in a global security policy?

<p>Complying with local laws and regulations</p> Signup and view all the answers

What is the best way to measure the effectiveness of an information security program?

<p>Alignment with business objectives</p> Signup and view all the answers

What is the primary objective of an information security governance framework?

<p>To provide a baseline for optimizing the security profile of the organization and manage and reduce risk</p> Signup and view all the answers

What is the first consideration when deciding to move to a cloud-based model?

<p>The physical location of the data</p> Signup and view all the answers

What is the best course of action for an information security manager due to changes in an organization's environment?

<p>Evaluate countermeasures to mitigate new risks</p> Signup and view all the answers

What is important when implementing controls to manage risk to an acceptable level?

<p>Obtaining input from risk owners</p> Signup and view all the answers

In the Infrastructure as a Service (IaaS) cloud model, who assumes the most security responsibility?

<p>The cloud service buyer</p> Signup and view all the answers

What does establishing a clear definition of a security incident in an incident response plan primarily help in developing?

<p>Effective escalation and response procedures</p> Signup and view all the answers

What should be the first step when developing a business case for a new intrusion detection system (IDS) solution?

<p>Define the issues to be addressed</p> Signup and view all the answers

Who should provide approval of risk acceptance for non-compliant online collaboration service after a risk assessment?

<p>Business senior management</p> Signup and view all the answers

What does the Certified Information Security Manager (CISM) Study Manual provide?

<p>Explanations and guidance for various aspects of information security management and governance</p> Signup and view all the answers

What is valuable for professionals seeking to understand and implement effective information security practices and technologies in their organizations?

<p>The information provided</p> Signup and view all the answers

What should the information security manager do FIRST when IT personnel are not adhering to the information security policy due to process inefficiencies?

<p>Determine the risk related to noncompliance with the policy.</p> Signup and view all the answers

Following the deployment of which of the following techniques will security administration efforts be greatly reduced?

<p>Role-based access control</p> Signup and view all the answers

What should be the information security manager's PRIMARY focus when a risk owner has accepted a large amount of risk due to the high cost of controls?

<p>Establishing a strong ongoing risk monitoring process.</p> Signup and view all the answers

Which of the following presents the GREATEST challenge to a security operations center's early warning system of potential security breaches?

<p>IT system clocks are not synchronized with the centralized logging server.</p> Signup and view all the answers

What is the most important basis for developing an effective information security program?

<p>Having an information security strategy in place</p> Signup and view all the answers

Which is the best method to ensure compliance with password standards?

<p>Encouraging the use of long passphrases</p> Signup and view all the answers

What is the most important for ensuring information stored by an organization is protected appropriately?

<p>Defining information asset ownership</p> Signup and view all the answers

What is the best way to obtain organizational support for the implementation of security controls?

<p>Establishing effective stakeholder relationships</p> Signup and view all the answers

What is the best justification for making a revision to a password policy?

<p>A risk assessment</p> Signup and view all the answers

What should password syntax rules allow?

<p>At least 8 characters and up to 64 characters, accept all printable ASCII characters and Unicode characters, and encourage the use of long passphrases</p> Signup and view all the answers

What is not the best way to ensure compliance with password standards?

<p>Using password-cracking software</p> Signup and view all the answers

What is the best way to mitigate potential risks associated with a system or process?

<p>Conducting a risk assessment</p> Signup and view all the answers

What is not the best way to obtain organizational support for the implementation of security controls?

<p>Conducting periodic vulnerability assessments</p> Signup and view all the answers

What is the best way to ensure compliance with password standards?

<p>Automated enforcement of password syntax rules</p> Signup and view all the answers

What is the best course of action for making a revision to a password policy?

<p>Conducting a risk assessment</p> Signup and view all the answers

What is the best method to ensure compliance with password standards?

<p>Automated enforcement of password syntax rules</p> Signup and view all the answers

Who is responsible for determining access levels to an application processing client information?

<p>Business unit management</p> Signup and view all the answers

What is the primary focus for the information security manager when outsourcing IT operations?

<p>Ensuring security requirements are included in the vendor contract</p> Signup and view all the answers

What is the first step for an information security manager after acquiring a company in a foreign country?

<p>Assessing the existing information security laws</p> Signup and view all the answers

What is the greatest concern for an information security manager with outsourced data entry?

<p>Data confidentiality</p> Signup and view all the answers

What is the first step to be taken when an IoT device is confirmed to have been hacked?

<p>Disconnect the device from the network</p> Signup and view all the answers

What is the primary purpose of security metrics in information security?

<p>Measuring control effectiveness and evaluating security posture</p> Signup and view all the answers

What is the responsibility of password policies according to the text?

<p>To be based on the organization's information asset risks and protection needed</p> Signup and view all the answers

What is the benefit of aligning information security program requirements with employment and staffing processes?

<p>Granting access based on task requirements</p> Signup and view all the answers

What is the purpose of including examples of help desk requests in user security awareness training?

<p>To reflect frequently encountered incidents</p> Signup and view all the answers

What do secure transmission protocols protect transactions from?

<p>Eavesdropping</p> Signup and view all the answers

What is the primary purpose of a balanced scorecard in information security governance?

<p>Aligning security objectives with business goals</p> Signup and view all the answers

What is the responsibility of business unit management according to the text?

<p>Determining access levels to an application processing client information</p> Signup and view all the answers

What is the primary focus of a balanced scorecard in the context of information security programs?

<p>Linking financial, customer, internal process, and learning and growth perspectives</p> Signup and view all the answers

What is the most beneficial exercise for an incident response team at the first drill?

<p>Structured walk-through exercise</p> Signup and view all the answers

What is the best way for an organization to ensure that incident response teams are properly prepared?

<p>Conducting tabletop exercises appropriate for the organization</p> Signup and view all the answers

What is the most important criterion when deciding whether to accept residual risk?

<p>Cost of replacing the asset</p> Signup and view all the answers

What is the primary benefit of maintaining an information security governance framework?

<p>Communicating and monitoring vision and strategy</p> Signup and view all the answers

What is the primary responsibility of the incident response team?

<p>Handling information security incidents</p> Signup and view all the answers

What is the primary purpose of Key Performance Indicators (KPIs) in cybersecurity risk management?

<p>Measuring the effectiveness of security controls</p> Signup and view all the answers

What is the PRIMARY reason for ensuring clearly defined roles and responsibilities are communicated to users with administrative privileges?

<p>Preventing misuse of administrative privileges</p> Signup and view all the answers

What should an organization capture in its risk register to ensure risks are actively managed?

<p>Specific responsibilities and accountabilities for managing risks</p> Signup and view all the answers

What is the best way to present quarterly reports to the board on the status of the information security program?

<p>Key Performance Indicators (KPIs)</p> Signup and view all the answers

What is the primary benefit of obtaining senior management buy-in for risk and control ownership?

<p>Establishing authority and accountability of risk and control owners</p> Signup and view all the answers

What is the primary purpose for continuous monitoring of security controls?

<p>Measuring the effectiveness of security controls</p> Signup and view all the answers

What is the BEST way to address the situation of several production databases not having owners assigned to them?

<p>Assign responsibility to the database administrator (DBA).</p> Signup and view all the answers

Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?

<p>Training on risk management procedures</p> Signup and view all the answers

Which of the following provides the BEST evidence that a recently established information security program is effective?

<p>The number of reported incidents has increased</p> Signup and view all the answers

What should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?

<p>Perform a risk assessment.</p> Signup and view all the answers

What is the responsibility of a risk owner?

<p>Implementing controls to mitigate the risk</p> Signup and view all the answers

Which of the following is the BEST course of action to prevent further damage upon notification of a compromised endpoint device?

<p>Isolate the endpoint device.</p> Signup and view all the answers

What is the PRIMARY benefit of an information security awareness training program?

<p>Influencing human behavior</p> Signup and view all the answers

Which of the following is the MOST effective security outcome in an organization's contract management process?

<p>Ensuring security requirements are defined at the request-for-proposal (RFP) stage</p> Signup and view all the answers

Which of the following would provide the MOST effective security outcome in an organization's contract management process?

<p>Ensuring security requirements are defined at the request-for-proposal (RFP) stage</p> Signup and view all the answers

Which of the following is the BEST course of action upon noticing that several production databases do not have owners assigned to them?

<p>Assign responsibility to the database administrator (DBA).</p> Signup and view all the answers

Which of the following is the MOST critical factor for information security program success?

<p>The information security manager's knowledge of the business</p> Signup and view all the answers

What should the Chief Information Security Officer (CISO) do FIRST upon learning that a third-party service provider did not notify the organization of a data breach?

<p>Determine the extent of the impact to the organization</p> Signup and view all the answers

What is the BEST way to ensure information security governance is aligned with corporate governance?

<p>Integration of security reporting into corporate reporting</p> Signup and view all the answers

Which of the following is the BEST way to transform an organization's culture to support information security?

<p>Strong management support</p> Signup and view all the answers

What is the BEST way to proceed when independent penetration test results show a high-rated vulnerability in a cloud-based application close to going live?

<p>Postpone the implementation until the vulnerability has been fixed.</p> Signup and view all the answers

What is MOST important to have in place to help ensure an organization's cybersecurity program meets the needs of the business?

<p>Information security governance</p> Signup and view all the answers

What is the BEST method for determining whether a firewall has been configured to provide a comprehensive perimeter defense?

<p>A validation of the current firewall rule set</p> Signup and view all the answers

What is the MOST important factor of a successful information security program?

<p>The program is focused on risk management.</p> Signup and view all the answers

What is a desired outcome of information security governance?

<p>Improved risk management</p> Signup and view all the answers

When an organization quickly shifts to a work-from-home model with an increased need for remote access security, what should be given immediate focus?

<p>Strengthening endpoint security</p> Signup and view all the answers

What should an information security manager do FIRST when a mandatory security standard hinders the achievement of an identified business objective?

<p>Escalate to senior management.</p> Signup and view all the answers

What is the MOST accurate way to determine the alignment of an information security strategy with organizational goals?

<p>Percentage of controls integrated into business processes</p> Signup and view all the answers

What is an information security manager's MOST important course of action when responding to a major security incident that could disrupt the business?

<p>Identify the indicators of compromise.</p> Signup and view all the answers

What type of control is being considered when an organization creates a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages?

<p>Preventive</p> Signup and view all the answers

What should be given the HIGHEST priority when an information security manager is tasked with leading the IT risk management process during a digital transformation?

<p>Identification of risk</p> Signup and view all the answers

What is the PRIMARY advantage of involving end users in continuity planning?

<p>They have a better understanding of specific business needs.</p> Signup and view all the answers

What is the most important consideration when defining how an information security budget should be allocated?

<p>The information security strategy</p> Signup and view all the answers

What is the primary benefit of maintaining an information security governance framework?

<p>Mitigating security risks</p> Signup and view all the answers

What is the greatest challenge to the recovery of critical systems and data following a ransomware incident?

<p>Unavailability or corruption of data backups</p> Signup and view all the answers

What is the most important issue in a penetration test?

<p>Having a defined goal and success criteria</p> Signup and view all the answers

What is the greatest threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?

<p>Unauthorized access</p> Signup and view all the answers

What is the best offering to assist customers in recovering from a security incident in a typical Infrastructure as a Service (IaaS) model?

<p>Snapshot of virtual machines</p> Signup and view all the answers

What is the primary benefit of conducting a reverse lookup in preventing Internet Protocol (IP) spoofing?

<p>Verifying the authenticity of the source IP address</p> Signup and view all the answers

What is the most important issue when there are significant exceptions to a newly released industry-required security standard?

<p>Assessing the consequences of noncompliance</p> Signup and view all the answers

What is a common drawback of email software packages that provide native encryption of messages?

<p>Inability to interoperate across product domains</p> Signup and view all the answers

What should the incident management team leader do after a cyberattack?

<p>Conduct a meeting to capture lessons learned</p> Signup and view all the answers

What defines the triggers within a business continuity plan (BCP) according to the text?

<p>The disaster recovery plan (DRP)</p> Signup and view all the answers

What is the best way to reduce the risk of security incidents from targeted email attacks?

<p>Implementing a security awareness training program for employees</p> Signup and view all the answers

What is the first step an information security manager should take to comply with new security incident response requirements?

<p>Conduct a gap analysis</p> Signup and view all the answers

What is the most useful source when planning a business-aligned information security program?

<p>Business Impact Analysis (BIA)</p> Signup and view all the answers

What should be the highest priority during an information security post-incident review?

<p>Evaluating the effectiveness of the incident response effort</p> Signup and view all the answers

What is the most effective way to prevent information security incidents?

<p>Implementing a security awareness training program for employees</p> Signup and view all the answers

What is the primary focus of a Business Impact Analysis (BIA) in the context of information security?

<p>Identifying the security controls and measures to reduce operational disruptions</p> Signup and view all the answers

What is the most useful way to obtain senior management support for an information security program?

<p>Conducting a gap analysis to demonstrate areas for improvement</p> Signup and view all the answers

What is the primary objective of a post-incident review of an information security incident?

<p>Evaluating the effectiveness of the incident response effort</p> Signup and view all the answers

What is the most important aspect of project management in an organizational context?

<p>Aligning project goals with organizational strategy</p> Signup and view all the answers

What is the primary role of multi-factor authentication (MFA) in information security?

<p>Preventing unauthorized access by requiring multiple credentials</p> Signup and view all the answers

What is the purpose of a balanced scorecard in information security governance?

<p>To align security metrics with organizational objectives</p> Signup and view all the answers

What should be the highest priority for an organization creating an enterprise strategy for protecting data across multiple repositories?

<p>Developing a comprehensive data classification policy</p> Signup and view all the answers

What is the primary advantage of single sign-on (SSO)?

<p>It enhances the efficiency of access management</p> Signup and view all the answers

How can confidentiality of content when accessing an email system over the Internet be ensured?

<p>By using digital encryption</p> Signup and view all the answers

What is the most important consideration of business continuity management?

<p>Ensuring human safety</p> Signup and view all the answers

What is the primary advantage of a balanced scorecard in the context of information security programs?

<p>It provides a comprehensive view of security performance</p> Signup and view all the answers

What is the best course of action for the information security manager if a threat intelligence report indicates a large number of ransomware attacks targeting the industry?

<p>Assess the risk to the organization</p> Signup and view all the answers

What should be the primary focus of an incident response plan?

<p>Ensuring incidents are responded to by the appropriate individuals</p> Signup and view all the answers

What is the most effective message to obtain senior management's commitment to information security management?

<p>Security supports and protects the business</p> Signup and view all the answers

What is the best course of action for the information security manager when the business activity residual risk is lower than the acceptable risk level?

<p>Monitor the effectiveness of controls</p> Signup and view all the answers

What is the most important component of monthly information security reports to the board?

<p>Trend analysis of security metrics</p> Signup and view all the answers

What is the best course of action for the information security manager if a soon-to-be deployed online application will increase risk beyond acceptable levels?

<p>Present a business case for additional controls to senior management</p> Signup and view all the answers

What is the most important factor to consider when reevaluating risk in information security management?

<p>Changes in the threat landscape</p> Signup and view all the answers

What should the new information security manager review when developing an information security strategy for a non-regulated organization?

<p>Management's business goals and objectives</p> Signup and view all the answers

Study Notes

Information Security Manager Responsibilities and Best Practices

  • The primary responsibility of an information security manager implementing company-owned mobile devices is to review and update existing security policies.
  • Security policies define the goals, objectives, and requirements for protecting information and systems and should be regularly reviewed and updated.
  • The information security manager should address aspects like scope, acceptable use, security standards, roles and responsibilities, procedures, and incident response in security policies.
  • The review and update of security policies align the security program with business objectives, risk appetite, and applicable laws and regulations.
  • Requiring remote wipe capabilities, conducting security awareness training, and enforcing passwords and data encryption are possible actions or controls derived from updated security policies.
  • The effectiveness of an organization's information security program is best measured by return on information security investment.
  • To overcome the perception that security is a hindrance to business activities, an information security manager should promote the relevance and contribution of security.
  • Protecting an enterprise from advanced persistent threats (APTs) is most helpful with defined security standards.
  • When choosing controls to mitigate risk, the information security manager's decision should be mainly driven by regulatory requirements.
  • Defined levels of severity are the best determinant of resource allocation during a security incident response.
  • The first step an information security manager should take when creating an organization's disaster recovery plan (DRP) is to conduct a business impact analysis (BIA).
  • Identifying the response and recovery teams, reviewing the communications plan, and developing response and recovery strategies are subsequent steps in creating a DRP.

Information Security Management - Key Concepts and Best Practices

  • Regular incident response testing cannot prevent brute force attacks, which are related to security threats from external sources.
  • Stolen data cannot be prevented by regular incident response testing as it is related to security breaches that may occur despite the incident response plan or process.
  • The primary purpose for continuous monitoring of security controls is to ensure the effectiveness of controls, including identifying potential weaknesses and addressing them.
  • Incident response teams can best leverage the results of a business impact analysis (BIA) by assigning restoration priority during incidents based on the BIA findings.
  • After deciding to adopt a bring your own device (BYOD) strategy, the next step for the information security manager is to define control requirements to ensure the security policy framework encompasses the new business model.
  • An effective information security training program should be based on employees' roles and responsibilities, tailored to specific job functions.
  • The evaluation of incident response effectiveness is best supported by a post-incident review process.
  • To lower the cost of implementing application security controls, the best option is to integrate security activities within the development process to address security throughout the software development life cycle (SDLC).
  • The primary responsibility of an information security manager in an organization implementing the use of company-owned mobile devices is to require remote wipe capabilities for devices to enhance security.
  • The information security manager should communicate potential business impact with regard to open items from the risk register when reporting to senior management.
  • Defining control requirements is the next step after a risk assessment to ensure the security policy framework aligns with the BYOD strategy.
  • Integrating security activities within the development process is the best option to lower the cost of implementing application security controls.

Information Security Program Effectiveness and Key Considerations

  • Project management involves planning, executing, and monitoring projects to achieve specific objectives within constraints such as time, budget, scope, and quality.
  • Balanced scorecards can measure the performance of individual projects or project portfolios but are not specific to information security projects.
  • Performance is the degree to which an organization or a process achieves its objectives or meets its standards.
  • Risk management involves identifying, analyzing, evaluating, treating, monitoring, and communicating risks that affect an organization's objectives.
  • An online bank should first isolate the affected network segment in the event of a successful network attack.
  • Security metrics are the most important to include in a report to key stakeholders regarding the effectiveness of an information security program.
  • An information security program is a set of policies, procedures, standards, guidelines, and tools aimed at protecting an organization's information assets from threats and ensuring compliance with laws and regulations.
  • Embedding compliance requirements within operational processes provides ongoing assurance that legal and regulatory compliance requirements can be met.
  • Regulatory compliance involves following external legal mandates set forth by state, federal, or international governments.
  • A balanced scorecard demonstrates the added value of an information security program by measuring and reporting on key performance indicators and key risk indicators aligned with strategic objectives.
  • Recovery time objectives (RTOs) are the most important consideration when determining which type of failover site to employ.
  • Different types of failover sites, such as hot sites, warm sites, and cold sites, vary in terms of availability, cost, and complexity.

Information Security Governance and Best Practices

  • The best way to integrate information security governance into enterprise governance is by establishing an information security steering committee.
  • When granting remote access to confidential information to a vendor for analytic purposes, the most important security consideration is that the vendor must agree to the organization's information security policy.
  • The primary basis for determining the value of assets should be the business cost when assets are not available.
  • The best way to reduce the risk associated with a bring your own device (BYOD) program is to implement a mobile device policy and standard, including guidelines and rules regarding the use of mobile devices and requirements for secure mobile device practices.
  • To ensure the security policy framework encompasses a new business model, the information security manager's first step should be to perform a gap analysis.
  • The most important consideration when defining a recovery strategy in a business continuity plan (BCP) is the organizational tolerance to service interruption.
  • The best approach to incident response for an organization migrating to a cloud-based solution is to revise incident response procedures to encompass the cloud environment.
  • The primary basis for a severity hierarchy for information security incident classification should be the adverse effects on the business.
  • Spoofing should be prevented because it may be used to gain illegal entry to a secure system by faking the sender's address.
  • Spoofing is a technique that involves impersonating someone or something else to deceive or manipulate the recipient or target, and can be applied to various communication channels, such as emails, websites, phone calls, IP addresses, or DNS servers.

Information Security Management Summary

  • Patch management is the best security process to prevent the exploitation of system vulnerabilities.
  • Current documentation of security processes is the best support for information security management in the event of organizational changes in security personnel.
  • Evaluations of the adequacy of existing controls are most important to include in a post-incident review following a data breach.
  • The business continuity coordinator is responsible for determining the initial recovery time objective (RTO) in a business impact analysis (BIA).
  • Initiating incident response is the first action an information security manager should take when an employee reports the loss of a personal mobile device containing corporate information.
  • Providing training on secure development practices to programmers is the best way to ensure that security is integrated during application development.
  • Requiring disaster recovery documentation to be stored with all key decision makers is the best way to ensure the plan can be carried out in an emergency.
  • Requiring staff to participate in information security awareness training is the most effective way to help staff members understand their responsibilities for information security.
  • Reviewing controls listed in the vendor contract is the most helpful approach for properly scoping the security assessment of an existing vendor.
  • Storing disaster recovery documentation in a public cloud is not the best way to ensure the plan can be carried out in an emergency.
  • Maintaining an outsourced contact center in another country is not the best way to ensure the plan can be carried out in an emergency.
  • Focusing the review on the infrastructure with the highest risk is not the most helpful approach for properly scoping the security assessment of an existing vendor.

Information Security Management Summary

  • Eradication is a critical phase in incident response, involving the removal of threats and restoration of secure systems to prevent further damage or compromise.
  • In the event of a serious vulnerability in a cloud application, the best course of action for an information security manager is to report the situation to the business owner of the application.
  • The most effective indication of an information security awareness training program is an increase in the identification rate during phishing simulations.
  • Process owners' input is of greatest importance in the development of an information security strategy.
  • The best way to monitor for advanced persistent threats (APTs) is to search for anomalies in the environment, such as unusual network traffic or user behavior.
  • When determining asset valuation, it is most important to consider the potential business loss.
  • The first step in developing an information security strategy is to perform a gap analysis based on the current state.
  • When developing a multi-year plan, the most important consideration for an information security manager is to ensure alignment with the plans of other business units.
  • In the context of developing an information security strategy, laws and regulations provide the most useful input to determine the organization's information security strategy.
  • An information security manager's best action, when believing that information has been classified inappropriately, is to refer the issue to internal audit for a recommendation.
  • The MOST important consideration for an information security manager when developing a multi-year plan is to ensure alignment with the plans of other business units.
  • In the context of developing an information security strategy, laws and regulations provide the most useful input to determine the organization's information security strategy.

Information Security Management Summary

  • The best evidence of alignment of information security governance with corporate governance is the average return on investment (ROI) associated with security initiatives.
  • Average number of security incidents across business units, mean time to resolution (MTTR) for enterprise-wide security incidents, and number of vulnerabilities identified for high-risk information assets are not good metrics for alignment with corporate governance.
  • The first course of action for an information security manager, upon discovering an HVAC vendor with remote access to stores, should be to review the vendor contract.
  • Reviewing the vendor contract helps to understand the contractual obligations, expectations, and identify any gaps or issues that need to be addressed or resolved.
  • Conducting a penetration test of the vendor, reviewing the vendor's technical security controls, and disconnecting the real-time access are not the first course of action for the information security manager in this scenario.
  • When developing a business case to justify an information security investment, the results of a risk assessment would best enable an informed decision by senior management.
  • The primary benefit to an organization that maintains an information security governance framework is that business risks are managed to an acceptable level.
  • Maintaining an information security governance framework prioritizes resources to maximize return on investment (ROI).
  • It helps communicate information security guidelines across the enterprise.
  • It also helps the organization remain compliant with regulatory requirements.
  • The information security manager's first course of action should be to review the vendor contract when discovering an HVAC vendor with remote access to stores.
  • Reviewing the vendor contract helps understand the contractual obligations, expectations, and identify any gaps or issues that need to be addressed or resolved.

Information Security Management Summary

  • The primary basis for an information security strategy should be the organization's vision and mission, guiding security policies and practices.
  • When senior management accepts the risk of noncompliance with a new regulation, the information security manager should update details within the risk register.
  • Alignment of a security awareness program with the organization's business strategy should prioritize people and culture.
  • An organization replacing desktop computers with tablets for shift-based staff should conduct a mobile device risk assessment to mitigate the increased risk of theft.
  • Key risk indicators (KRIs) provide early warnings of potential exposure to risk, and the criticality of information helps prioritize risks.
  • The best course of action for the information security manager to support leveraging social network platforms is to assess the security risk associated with their use.
  • Security risk assessment involves identifying, analyzing, and evaluating potential threats and vulnerabilities to information assets.
  • Establishing processes to publish content on social networks should be performed after assessing security risk and implementing necessary controls.
  • Conducting vulnerability assessments on social network platforms may not be feasible or effective due to lack of control over infrastructure and configuration.
  • Developing security controls for the use of social networks should be based on the results of security risk assessment and aligned with the organization's risk appetite and tolerance.
  • Information security manager should report the decision to the compliance officer, update details within the risk register, reassess the organization's risk tolerance, and assess the impact of the regulation.
  • It is essential to ensure information security is aligned with the organization's strategy to prioritize business goals and protect critical assets.

Information Security Program, Level of Protection, Strategy Alignment, and Risk Management

  • Delivering an information security awareness campaign is the best approach to obtain support for a new organization-wide information security program.
  • The most important factor when deciding the level of protection for an information asset is the impact to the business function.
  • The best indication of information security strategy alignment with the organization's objectives is the number of business objectives directly supported by information security initiatives.
  • Threat analysis is the best analysis to identify the external influences to an organization's information security.
  • The most important detail to capture in an organization's risk register is the risk ownership.
  • The most important factor to obtain senior leadership support when presenting an information security strategy is that the strategy aligns with management's acceptable level of risk.
  • An organization planning to leverage popular social network platforms to promote its products and services should conduct a risk assessment and implement appropriate controls to manage the associated risks.
  • When obtaining support for an information security program, it is crucial to ensure that all stakeholders understand the importance of information security and the associated risks.
  • The level of protection for an information asset should be determined based on its importance to the organization's operations and its impact on the organization's overall security posture.
  • It is important to capture risk ownership in the risk register to ensure that risks are actively managed and that responsible parties are held accountable.
  • The information security strategy should align with management's acceptable level of risk to obtain senior leadership support.
  • The external influences to an organization's information security can be identified through a threat analysis process.

Information Security Management Summary

  • Service Level Agreement (SLA) defines expectations and obligations between a service provider and consumer, including availability, performance, and security.
  • To obtain senior management support for an information security governance program, it's best to demonstrate the program's value to the organization.
  • Before conducting full-functional continuity testing, an information security manager should verify that teams and individuals responsible for recovery have been identified and trained on their roles and responsibilities.
  • When an organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor, the information security manager should review independent security assessment reports for each vendor first.
  • The primary objective of performing a post-incident review is to identify the root cause of the incident, which is used to develop and implement corrective actions to prevent similar incidents from occurring in the future.
  • The most critical aspect when creating an incident response plan is identifying what constitutes an incident.
  • To mitigate the risk of external brute force attacks on critical systems, the most effective way is to implement multi-factor authentication.
  • Updating the disaster recovery plan (DRP) periodically has the greatest positive impact on the ability to execute the plan, as it ensures the plan reflects the current environment and addresses potential risks or issues before an emergency arises.

Information Security Management Summary

  • Mitigation involves taking actions to lessen the negative effects of a risk, such as implementing security controls, policies, or procedures.
  • A firewall is a security device that monitors and filters network traffic, helping to mitigate the risk of unauthorized access, exploitation, or attack on legacy applications that cannot be patched.
  • When a new vulnerability affecting key data processing systems is identified, the first step is to re-evaluate the risk associated with the vulnerability.
  • A vulnerability is a weakness that can be exploited by an attacker to compromise a system or network, potentially affecting key data processing systems within an organization.
  • The best way to ensure the capability to restore clean data after a ransomware attack is to maintain multiple offline backups.
  • A successful information security culture is indicated when end users know how to identify and report incidents.
  • When a newly introduced privacy regulation affects the business, the information security manager's first course of action should be to identify and assess the risk in the context of business objectives.
  • Privileged employee access requests to production servers being approved without user actions being logged raises the greatest concern of lack of accountability.
  • The greatest benefit of information asset classification is providing a basis for implementing a need-to-know policy.
  • Information asset classification helps define resource ownership.
  • Information asset classification supports segregation of duties.
  • Information asset classification does not help determine the recovery point objective (RPO).

Information Security and Risk Management Summary

  • Building a robust information security culture in an organization is primarily achieved through senior management approval of information security policies.
  • When responding to a ransomware attack, the primary consideration is to ensure the business can operate to minimize disruption and impact on critical functions and services.
  • The best way to embed the organization's security objectives in business operations is to implement an information security governance framework.
  • When designing a disaster recovery plan, the availability of Business Impact Analysis (BIA) results is essential to prioritize system restoration.
  • A buffer overflow is best described as a function being carried out with more data than it can handle, presenting a security risk.
  • To protect newly acquired data assets prior to integration, the best approach is to perform a risk assessment.
  • When developing an asset classification program, creating an inventory should be completed first.
  • In an organization where the main product is a customer-facing SaaS application, the data owner is primarily accountable for addressing major security vulnerabilities identified at the primary cloud provider.
  • Management decision on asset value is the most important requirement for a successful security program.
  • To achieve compliance with new global regulations related to the protection of personal information, determining the current and desired state of controls is the best way.
  • Asset classification primarily determines the level of protection required for assets.
  • For the effective implementation of an information security governance program, it is most important that the program goals are communicated and understood by the organization.

Information Security Management and Governance

  • Risk tolerance and organizational objectives do not influence how information security is integrated within the business, but rather what information security aims to achieve or protect.
  • The state of the organization and information security personnel are not influential in how information security is integrated within the business, but rather what the organization aspires to be or do, and who performs information security tasks or activities.
  • Obtaining input from risk owners when implementing controls is important to manage the risk to an acceptable level and tailor the controls to specific risks.
  • Due to changes in an organization's environment, the best course of action for an information security manager is to evaluate countermeasures to mitigate new risks.
  • Approval of risk acceptance for non-compliant online collaboration service should be provided by business senior management after a risk assessment.
  • In the Infrastructure as a Service (IaaS) cloud model, the cloud service buyer assumes the most security responsibility.
  • The primary objective of an information security governance framework is to provide a baseline for optimizing the security profile of the organization and manage and reduce risk.
  • Establishing a clear definition of a security incident in an incident response plan primarily helps in developing effective escalation and response procedures.
  • The first consideration when deciding to move to a cloud-based model should be the physical location of the data.
  • The first step when developing a business case for a new intrusion detection system (IDS) solution is to define the issues to be addressed.
  • The Certified Information Security Manager (CISM) Study Manual provides explanations and guidance for various aspects of information security management and governance.
  • The information provided is valuable for professionals seeking to understand and implement effective information security practices and technologies in their organizations.

Information Security and Disaster Recovery Planning

  • Balanced scorecard is a strategic management tool linking financial, customer, internal process, and learning and growth perspectives.
  • Disaster recovery plan (DRP) tasks include developing a test plan, analyzing business impact, defining response team roles, and identifying recovery time objectives (RTOs).
  • Effective communication during information security incidents is best supported by predetermined service level agreements (SLAs).
  • The most beneficial exercise for an incident response team at the first drill is a tabletop exercise.
  • The most important criterion when deciding whether to accept residual risk is the cost of replacing the asset.
  • A recovery point objective (RPO) is required in a disaster recovery plan (DRP).
  • The best way for an organization to ensure that incident response teams are properly prepared is by conducting tabletop exercises appropriate for the organization.
  • Obtaining senior management buy-in enables the assignment of risk and control ownership.
  • Risk and control ownership refers to the assignment of specific responsibilities and accountabilities for managing risks and controls to individuals or groups within the organization.
  • Obtaining senior management buy-in helps to establish the authority and accountability of the risk and control owners and provide them with necessary resources and support.
  • The balanced scorecard helps organizations communicate and monitor their vision and strategy across different levels and functions.
  • The balanced scorecard describes the cause-and-effect linkages between high-level perspectives of strategy and execution.

Information Security Management Exam Prep

  • Merger with another organization can require a revision to the information security program due to changes in structure, size, and information systems.
  • The best way to reduce the risk of security incidents from targeted email attacks is to conduct awareness training across the organization.
  • Conducting awareness training helps educate and empower employees to recognize and avoid falling for targeted email attacks.
  • The first step an information security manager should take to comply with new security incident response requirements is to conduct a gap analysis.
  • The most effective way to prevent information security incidents is to implement a security awareness training program for employees.
  • Security awareness training provides employees with the knowledge and skills to identify potential security threats and reduce the risk of information security incidents.
  • The most useful source when planning a business-aligned information security program is a Business Impact Analysis (BIA).
  • A BIA helps identify the security controls and measures that should be implemented to reduce the impact of disruptions to an organization's operations.
  • The highest priority during an information security post-incident review should be given to evaluating the effectiveness of the incident response effort.
  • Evaluating incident response effectiveness includes assessing the accuracy, timeliness, and efficiency of the response to identify areas for improvement.
  • Documenting actions taken in sufficient detail, updating key risk indicators (KRIs), and evaluating the performance of incident response team members are all important components of a post-incident review.
  • These insights are derived from ISACA's Certified Information Security Manager (CISM) Study Manual, Section 3.1, and various reputable sources.

Information Security Management Summary

  • The best course of action when the business activity residual risk is lower than the acceptable risk level is to monitor the effectiveness of controls.
  • Monthly information security reports to the board should include trend analysis of security metrics as the most important component.
  • An incident response plan should include a detailed incident notification process to ensure incidents are responded to by the appropriate individuals.
  • The most effective message to obtain senior management's commitment to information security management is that security supports and protects the business.
  • The primary advantage of single sign-on (SSO) is that it increases the efficiency of access management.
  • When a threat intelligence report indicates a large number of ransomware attacks targeting the industry, the best course of action is to assess the risk to the organization.
  • Confidentiality of content when accessing an email system over the Internet can be ensured through digital encryption.
  • Reevaluation of risk is most critical when there is a change in the threat landscape.
  • The most important consideration of business continuity management should be ensuring human safety.
  • Relationships between critical systems are best understood by performing a business impact analysis (BIA).
  • When a soon-to-be deployed online application will increase risk beyond acceptable levels, the best course of action for the information security manager is to present a business case for additional controls to senior management.
  • When a new information security manager is developing an information security strategy for a non-regulated organization, reviewing management's business goals and objectives would be most helpful.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Quizzes Like This

Use Quizgecko on...
Browser
Browser