Isaca CISM
Isaca CISM
Isaca CISM
CISM
Certified Information
Security Manager
Version: 25.2
Email: support@dumpscollection.com
IMPORTANT NOTICE
Feedback
We have developed quality product and state-of-art service to ensure our customers interest. If you have any
suggestions, please feel free to contact us at feedback@dumpscollection.com
Support
If you have any questions about our product, please provide the following items:
exam code
screenshot of the question
login id/email
please contact us at support@dumpscollection.com and our technical experts will provide support within 24 hours.
Copyright
The product of each order has its own encryption code, so you should use it independently. Any unauthorized
changes will inflict legal punishment. We reserve the right of final explanation for this statement.
Dumps Q&A Isaca - CISM
Which of the following would provide the MOST useful input when creating an information security program?
A. Business case
Answer: D
An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which
of the following is the STRONGEST justification foi granting an exception to the policy?
Answer: A
The PRIMARY purpose of asset valuation for the management of information security is to:
Answer: A
The PRIMARY reason an organization would require that users sign an acknowledgment of their system
access responsibilities is to:
Answer: A
Which of the following control type is the FIRST consideration for aligning employee behavior with an
organization’s information security objectives?
B. Directive security
Answer: D
Which of the following is the MOST important consideration when determining the approach for gaining
organization-wide acceptance of an information security plan?
D. Organizational culture
Answer: D
A business unit uses e-commerce with a strong password policy. Many customers complain that they cannot
remember their password because they are too long and complex. The business unit states it is imperative to
improve the customer experience. The information security manager should FIRST.
Answer: C
Over the last year, an information security manager has performed risk assessments on multiple third-party
vendors. Which of the following criteria would be MOST helpful in determining the associated level of risk
applied to each vendor?
Answer: A
Which of the following is the MOST effective way to detect social engineering attacks?
Answer: B
Within a security governance framework, which of the following is the MOST important characteristic of the
information security committee? The committee:
Answer: B
When using a newly implemented security information and event management (SIEM) infrastructure, which
of the following should be considered FIRST?
A. Encryption
B. Retention
C. Report distribution
D. Tuning
Answer: D
Which of the following is the MOST important requirement for the successful implementation of security
governance?
A. Mapping to organizational
Answer: A
Which of the following provides the BEST input to maintain an effective asset classification program?
C. Vulnerability assessment
Answer: A
Which of the following would be MOST effective when justifying the cost of adding security controls to an
existing web application?
C. A business case
Answer: C
To ensure appropriate control of information processed in IT systems, security safeguards should be based
PRIMARILY on:
D. established guidelines
Answer: A
Which of the following will BEST protect an organization against spear phishing?
A. Antivirus software
D. End-user training
Answer: D
Answer: C
Which of the following would present the GREATEST need to revise information security poll'
Answer: C
Which of the following BEST reduces the likelihood of leakage of private information via email?
B. Email encryption
D.
Answer: B
A threat intelligence report indicates there has been a significant rise in the number of attacks targeting the
industry. What should the information security manager do NEXT?
Answer: A
Which of the following would BEST justify spending for a compensating control?
A. Risk analysis
B. Vulnerability analysis
C. Threats analysis
D. Peer benchmarking
Answer: C
The GREATEST benefit of choosing a private cloud over a public cloud would be:
D. server protection.
Answer: A
Which of the following activities BEST enables executive management to ensure value delivery within an
information security program?
Answer: D
Which of the following should be PRIMARILY included in a security training program for business process
owners?
C. Application vulnerabilities
Answer: B
Which of the following processes would BEST help to ensure that information security risks will be evaluated
when implementing a new payroll system?
A. Change management
B. Problem management
C. Configuration management
D. Incident management
Answer: A
A third-party contract signed by a business unit manager failed to specify information security requirements
Which of the following is the BEST way for an information security manager to prevent this situation from
reoccurring?
Answer: C
During which phase of an incident response process should corrective actions to the response procedure be
considered and implemented?
A. Review
B. Identification
C. Eradication
D. Containment
Answer: A
Which of the following is the MOST useful metric for determining how well firewall logs are being
monitored?
Answer: C
Which of the following is the BEST way to improve the timely reporting of information security incidents?
Answer: B
Which of the following is the BEST way to demonstrate to senior management that organizational security
practices comply with industry standards?
Answer: D
Which of the following is an information security manager's BEST course of action to address a significant
materialized risk that was not prevented by organizational controls?
Answer: D
As part of an international expansion plan, an organization has acquired a company located in another
jurisdiction. Which of the following would be the BEST way to maintain an effective information security
program?
A. Determine new factors that could influence the information security strategy.
Answer: A
A company has purchased a rival organization and is looking to integrate security strategies. Which of the
following is the GREATEST issue to consider?
Answer: D
Which of the following BEST enables an effective escalation process within an incident response program?
Answer: D
A policy has been established requiting users to install mobile device management (MDM) software on their
personal devices Which of the following would BEST mitigate the risk created by noncompliance with this
policy?
Answer: A
Which of the following MOST effectively prevents internal users from modifying sensitive data?
A. Network segmentation
C. Multi-factor authentication -
Answer: B
An information security manager s PRIMARY objective for presenting key risks to the board of directors is to:
Answer: D
When the inherent risk of a business activity is lower than the acceptable risk level, the BEST course of action
would be to:
B.
Answer: B
Which of the following is an information security manager’s BEST course of action when informed of
decision to reduce funding for the information security program?
Answer: B
Which of the following is the MOST effective data loss control when connecting a personally owned mobile
device to the corporate email system?
Answer: A
Which of the following is the PRIMARY reason social media has become a popular target for attack?
D.
Answer: D
An emergency change was made to an IT system as a result of a failure. Which of the following should be of
GREATEST concern to the organizations information security manager?
D. The information security manager did not review the change prior to implementation.
Answer: A
Which of the following is MOST important to the successful development of an information security strategy?
Answer: C
To gain a clear understanding of the impact that a new regulatory will have on an organization’s security
control, an information manager should FIRST.
Answer: C
Which of the following would be of GREATEST concern to an information security manager when evaluating
a cloud service provider (CSP)?
Answer: B
A new program has been implemented to standardize security configurations across a multinational
organization Following implementation, the configuration standards should:
Answer: B
Which of the following is the BEST resource for evaluating the strengths and weaknesses of an incident
response plan?
Answer: D
The MOST important factors in determining the scope and timing for testing a business continuity plan are:
B. prior testing results and the degree of detail of the business continuity plan
Answer: C
After implementing an information security governance framework, which of the following would provide the
BEST information to develop an information security project plan?
C. Balanced scorecard
D. Gap analysis
Answer: C
Which of the following would BEST assist an information security manager in gaining strategic support from
executive management?
Answer: C
Which of the following would contribute MOST to employees' understanding of data handling
responsibilities?
Answer: B
An access rights review revealed that some former employees' access is still active. Once the access is
revoked, which of the following is the BEST course of action to help prevent recurrence?
Answer: A
A contract bid is digitally signed and electronically mailed The PRIMARY advantage to using a digital
signature is that
D. the bid and the signature can be copied from one document to another
Answer: B
An information security manager is concerned that executive management does not su the following is the
BEST way to address this situation?
C. Report the risk and status of the information security program to the board.
Answer: D
Which of the following is the MOST effective approach for integrating security into application development?
Answer: C
An information security manager is concerned that executive management does not support information
security initiatives. Which of the following is the BEST way to address this situation?
C. Report the risk and status of the information security program to the board.
Answer: D
What should be information security manager’s FIRST course of action when it is discovered a staff member
Answer: A
Which of the following is the BEST method to defend against social engineering attacks?
Answer: C
Which of the following external entities would provide the BEST guideance to an organization facing
advanced attacks?
B. Open-source reconnaissance
Answer: A
Which of the following is the BEST way to prevent employees from making unauthorized comments to the
media about security incidents in progress?
Answer: C
An organization has implemented an enhanced password policy for business applications which requires
significantly more business resource to support clients. The BEST approach to obtain the support of business
management would be to:
Answer: A
Which of the following is the PRIMARY reason to invoke continuity and recovery plans?
Answer: A
Which of the following is the PRIMARY objective of a business impact analysis (BIA):
C.
D. Analyze vulnerabilities
Answer: A
Explanation
QUESRTION NO: 138
Which of the following should be define* I FIRST when creating an organization's information security
strategy?
A. Budget
C. Objectives
D. Organizational structures
Answer: C
Meeting which of the following security objectives BEST ensures that information is protected against
unauthorized modification?
A. Availability
B. Integrity
C. Confidentiality
D. Authenticity
Answer: B
Which of the following is the BEST way for an information security manager to promote the integration of
information security considerations into key business processes?
Answer: C
Senior management learns of several web application security incidents and wants to know the exposure risk
to the organization. What is the information security manager's BEST course of action?
Answer: A
A message is being sent with a hash. The risk of an attacker changing the message and generating an authentic
hash value c*n be mitigated by:
A. generating hash output that is the same size as the original message,
Answer: D
QUESRTION NO: 1 44
Which of the following sites would be MOST appropriate in the case of a very short recovery time objective
(RTO)?
A. Redundant
B. Shared
C. Warm
D. Mobile
Answer: A
Which of the following is the BEST indication that a recently adopted information security framework is a
good fit for an organization?
Answer: D
QUESRTION NO: 46
Which of the following is the BEST indication that a recently adopted information security framework is a
good fit for an organization?
Answer: D
Which of the following is MOST likely to result from a properly conducted post-incident review?
Answer: D
Answer: B
Which of the following is MOST likely to result from a properly conducted post-incident review?
Answer: D
Which of the following would provide senior management with the BEST overview of the performance of
information security risk treatment options?
Answer: A
The PRIMARY benefit of integrating information security activities into change management processes is to:
Answer: B
Which of the following processes is the FIRST step in establishing an information security policy?
Answer: B
When information security management is receiving an increased number of false positive incident reports,
which of the following is MOST important to review?
B. Firewall logs
Answer: D
Answer: D
Which of the following is the MOST effective way to identify changes in an information security
environment?
A. Continuous monitoring
B. Security baselining
Answer: B
An organization is in the process of adopting a hybrid data infrastructure, transferring all non-core applications
to cloud service providers and maintaining all core business functions in-house. The information security
manager has determined a defense in depth strategy should be used. Which of the following BEST describes
this strategy?
C. Multi-factor login requirements for cloud service applications timeouts, and complex passwords
Answer: B
Which of the following is MOST likely to drive an update to the information security strategy?
Answer: C
What would be an information security manager's BEST course of action when notified that the
implementation of some security controls is being delayed due to budget constraints?
Answer: A
What should be an organization'«. MAIN concern when evaluating an Infrastructure as a Service (laaS) cloud
computing model for an e-commerce application?
D. Application ownership
Answer: B
An organization will be outsourcing mission-critical processes. Which of the following is MOST important to
verify before signing the service level agreement (SLA)?
Answer: D
Which of the following is the MOST effective way to detect security incidents?
Answer: A
The MAIN reason for internal certification of web-based business applications is to ensure:
Answer: D
Senior management has approved employees working off-site by using a virtual private network (VPN)
connection. It is MOST important for the information security manager to periodically:
Answer: B
For a user of commercial software downloaded from the Internet, which of the following is the MOST
effective means of ensuring authenticity?
A. Digital signatures
B. Digital certificates
D. Steganography
Answer: C
Which of the following would be MOST important to consider when implementing security settings for a new
system?
Answer: C
In an organization with effective IT risk management, the PRIMARY reason to establish key risk indicators
(KRIs) is to:
Answer: D
A global organization is developing an incident response team (IRT). The organization wants to keep
headquarters informed of aP incidents and wants to be able to present a unified response to widely dispersed
events. Which of the following IRT models BEST supports these objectives?
A. Holistic IRT
B. Central IRT
C. Coordinating IRT
D. Distributed IRT
Answer: B
The PRIMARY benefit of integrating information security risk into enterprise risk management is to:
Answer: D
Knowing which of the following is MOST important when the information security manager is seeking senior
management commitment?
A. Security costs
B. Technical vulnerabilities
D. Implementation tasks
Answer: D
An information security manager determines the organizations critical systems may be vulnerable to a new
zero-day attack. The FIRST course of action is to:
D. survey peer organizations to see how they have addressed the issue.
Answer: A
Which of the following is the BKT approach for an information security manager when developing new
information security policies?
Answer: C
An organization has recently experienced unauthorized device access to its network. To proactively manage
the problem and mitigate this risk, the BEST preventive control would be to:
A. keep an inventory of network and hardware addresses of all systems connected to the network
B. implement network-level authentication and login to regulate access of devices to the network
C. deploy an automated asset inventory discovery tool to identify devices that access the network
Answer: C
Business units within an organization are resistant to proposed changes to the information security program.
Which of the following is the BEST way to address this issue?
Answer: B
Which of the following is the MOST important outcome from vulnerability scanning?
A. Prioritization of risks
Answer: C
Which of the following is the MOST important consideration when establishing an information security
governance framework?
Answer: B
Which of the following is MOST critical to review when preparing to outsource a data repository to a
cloud-based solution?
D. A risk assessment
Answer: D
Which of the following contributes MOST to the effective implementation of an information security strategy?
Answer: C
What is the MOST important consideration when establishing metrics for reporting to the information security
strategy committee?
Answer: C
When developing an incident response plan, which of the following is the MOST -effective way to ensure
incidents common to the organization are handled properly?
A.
Answer: A
A new regulation has been announced that requires mandatory reporting of security incidents that affect
personal client information. Which of the following should be the information security manager's FIRST
course of action?
Answer: D
A. organizational hierarchy.
Answer: C
An information security manager is reviewing the impact of a regulation on the organization’s human
resources system. The NEXT course of action should be to:
Answer: A
Which of the following should be done FIRST when selecting performance metrics to report on the vendor
risk management process?
Answer: A
The MOST likely cause of a security information event monitoring (SIEM) solution failing to identify a
serious incident is that the system:
Answer: D
Which of the following provides the MOST relevant evidence of incident response maturity?
Answer: A
It is suspected that key emails have been viewed by unauthorized parties. The email administrator conducted
an investigation but it has not returned any information relating to the incident, and leaks are continuing.
Which of the following is the BEST recommended course of action to senior management?
Answer: C
A. Threat assessment
B. Mitigation cost
C. Vulnerability analysis
D. Impact assessment
Answer: D
Which of the following is the MOST effective defense against spear phishing attacks?
B. Web filtering
C. Anti-spam solution
Answer: D
A newly hired information security manager discovers that the cleanup of accounts for terminated employees
happens only once a year. Which of the following should be the information security manager's FIRST course
of action?
Answer: D
Which of the following is the BEST way to increase the visibility of information security within an
organization's culture?
Answer: B
A third-party service provider has proposed a data loss prevention (DLP) solution. Which of the following
MUST be in place for this solution to be relevant to the organization?
C. A business case
D.
Answer: C
An information security manager suspects that the organization has suffered a ransomware attack. What
should be done FIRST
Answer: D
Which of the following is the BEST way for an information security manager to identify compliance with
information security policies within an organization?
Answer: D
Which of the following would be MOST effective in ensuring that information security is appropriately
addressed in new systems?
B. Information security staff take responsibility for the design of system security
Answer: D
Implementing a strong password policy is part of an organization s information security strategy for the year.
A business unit believes the strategy may adversely affect a client's adoption of a recently developed mobile
application and has decided not to implement the policy. Which of the following is the information security
manager s BEST course of action?
Answer: A
Which of the following helps to ensure that the appropriate resources are applied in a timely manner after an
incident has occurred?
Answer: C
For a business operating in a competitive and evolving online market, it is MOST important for a security
policy to focus on:
Answer: B
Which of the following is the PRIMARY responsibility of the information security steering committee?
Answer: A
An information security manager learns users of an application are frequently using emergency elevated
access privileges to process transactions Which of the following should be done FIRST?
C. Update the frequency and usage of the emergency access profile in the policy
Answer: A
Which of the following BEST indicates senior management support for an information security program?
B. The information security manager meets regularly with the lines of business.
C. Key performance indicators (KPIs) are defined for the information security program.
Answer: A
Which of the following is two MOST important step when establishing guidelines for the use of social
networking sites in an organization?
Answer: B
Which of the following should an information security manager establish FIRST to ensure security-related
activities are adequately monitored?
Answer: B
What is the MAIN reason for an organization to develop an incident response plan?
What is the MAIN reason for an organization to develop an incident response plan?
Answer: C
An organization is MOST at risk from a new worm being introduced through the intranet when:
Answer: B
When developing a disaster recovery plan, which of the following would be MOST helpful in prioritizing the
order in which systems should be recovered?
Answer: C
Answer: A
Before final acceptance of residual risk, what is the BEST way for an information security manager to address
risk factors determined to be lower than acceptable risk levels?
Answer: B
During an emergency security incident, which of the following would MOST likely predict the worst-case
scenario?
Answer: D
A. chain of evidence.
B. chain of attack.
C. forensic chain
D. evidence of attack.
Answer: A
Which of the following is the MOST important driver when developing an effective information security
strategy?
B. Compliance requirements
D. Benchmarking reports
Answer: B
Senior management commitment and support will MOST likely be offered when the value of information
security governance is presented from a:
A. threat perspective.
B. compliance perspective
C. risk perspective.
D. policy perspective.
Answer: C
Which of the following would be MOST important to include in a business case to help obtain senior
management's commitment for an information security investment?
Answer: C
Which of the following will BEST help to ensure security is addressed when developing a custom application?
Answer: B
Which of the following BEST demonstrates that an organization supports information security governance?
Answer: D
Which of the following would BEST enable an organization to effectively monitor the implementation of
standardized configurations?
Answer: D
Relying on which of the following methods when detecting new threats using IDS should be of MOST
concern?
B. Attack signatures
C. Heuristic analysis
D. Traffic analysis
Answer: A
When developing a classification method for incidents, the categories MUST be:
A. quantitatively defined.
B. regularly reviewed.
C. specific to situations.
Answer: A
Before final acceptance of residual risk, what is the BEST way for an information security manager to address
risk factors determined to be lower than acceptable risk levels?
Answer: B
Which of the following activities should take place FIRST when a security patch for Internet software is
received from a vendor?
B.
Answer: C
The BEST time to ensure that a corporation acquires secure software products when outsourcing software
development is during:
A. contract negotiation.
Answer: A
Which of the following is MOST critical for prioritizing actions in a business continuity plan (BCP)?
A. Risk assessment
C. Asset classification
Answer: B
After an information security business case has been approved by senior management, it should be:
Answer: A
Which of the following metrics is MOST useful to demonstrate the effectiveness of an incident response plan?
Answer: A
Which of the following is the BEST reason to reassess risk following an incident?
Answer: B
Which of the following is the BEST approach for encouraging business units to assume their roles and
responsibilities in an information security program?
Answer: C
Which of the following is MOST important when selecting a third-party security operations center?
A. Indemnity clauses
Answer: B
Which of the following should be the PRIMARY expectation of management when an organization introduces
an information security governance framework?
Answer: C
Which of the following is the MOST effective method for assessing the effectiveness of a security awareness
program?
A. Post-incident review
C. Vulnerability scan
D. Tabletop test
Answer: B
Which of the following is the MOST important reason for performing vulnerability assessments periodically?
Answer: C
A multinational organization wants to ensure its privacy program appropriately addresses privacy risk
throughout its operations. Which of the following would be of MOST concern to senior management?
Answer: A
What is the MOST important factor for determining prioritization of incident response?
Answer: B
An organization's information security strategy for the coming year emphasizes reducing the risk of
ransomware. Which of the following would be MOST helpful to support this strategy?
Answer: C
Which of the following should be the information security manager's NEXT step following senior
management approval of the information security strategy?
B. Develop a budget
Answer: D
Due lo budget constraints, an internal IT application does not include the necessary controls to meet a client
service level agreement (SLA). Which of the following is the information security manager's BEST course of
action?
Answer: B
A. Two-factor authentication
B. Periodic reaccredinations
C. Third-party certificates
D. Receipt acknowledgment
Answer: D
Following a successful and well-publicized hacking incident, an organization alias plans to improve
application security. Which of the following is a security project risk?
Answer: D
After a server has been attacked, which of the following is the BEST course of action?
Answer: C
A.
D. Forensic analysis
Answer: C
Which of the following is a MAIN security challenge when conducting a post-incident review related to bring
your own device (BYOD) in a mature, diverse organization?
Answer: B
Which of the following is MOST important to enable after completing action plan?
A. Threat profile
B. Inherent risk
C. Residual risk
D. Vulnerability landscape
Answer: C
When developing a new application, which of the following is the BEST approach to ensure compliance with
security requirements?
Answer: A
An organization s senior management is encouraging employees to use social media for promotional purposes.
Which of t following should be the information security manager's FIRST step to support this strategy?
Answer: A
When preparing a business case for the implementation of a security information and event management
(SIEM) system, which of the following should be a PRIMARY driver in the feasibility study?
A. Cost of software
B. Cost-benefit analysis
C. Implementation timeframe
D. Industry benchmarks
Answer: B
Executive management is considering outsourcing all IT operations. Which of the following functions should
remain internal?
A. Data encryption
B. Data ownership
C. Data custodian
D. Data monitoring
Answer: B
A business unit has requested IT to implement simple authentication using IDs and passwords. The
information security policy requires using multi-factor authentication. The information security manager
should FIRST:
Answer: C
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT)
actors?
Answer: D
The BEST way to improve the effectiveness of responding to and communicating security incidents is to
ensure:
D. additional staff are trained and available to assist with incident response.
Answer: C
Which of the following is the GREATEST risk associated with the head of information security reporting to
the chief information officer (CIO)?
Answer: D
The MOST effective control to detect fraud inside an organization's network is to:
A. segregate duties
D. implement C (IDS).
Answer: C
Which of the following is the MOST effective way to ensure the development of an application system will
align with organizational security standards?
Answer: B
Answer: A
In an organization that has undergone an expansion through an acquisition, which of the following would
BEST secure the enterprise network?
Answer: C
An information security manager determines there are a significant number of exceptions to a newly released
industry-required security standard. Which of the following should be done NEXT?
Answer: D
Which of the following is MOST helpful in integrating information security governance with corporate
governance?
C. Providing independent reports of information security efficiency and effectiveness to the board
Answer: A
In an organization with a rapidly changing environment, business management has accepted an information
security risk. It is MOS important for the information security manager to ensure:
Answer: B
To integrate security into system development life cycle (SDLC) processes, an organization MUST ensure that
security:
Answer: B
To prevent computers on the corporate network from being used as part of a distributed denial of service
(DDoS) attack, the information security manager should use:
A. rate limiting.
Answer: B
Which of the following measures BEST indicates an improvement in the information security program to
stakeholders?
Answer: C
Which of the following should be an information security manager's MOST important consideration when
determining if an information asset has been classified appropriate.
C. Ownership of information
D. Level of protection
Answer: A
Which of the following BEST contributes to the successful management of security incidents?
A. Current technologies
B. Tested controls
C. Established procedures
D. Established policies
Answer: C
An information security manager has identified numerous violations of security policy which prohibits text
messaging from personal devices to conduct official business following is the MOST effective way to reduce
the number of violations?
Answer: B
Which of the following should an information security manager do FIRST when developing a communication
plan to support incident management?
Answer: D
Which of the following BEST facilitates the development of a comprehensive information security policy?
Answer: D
A potential security breach has been reported to an organization s help desk. Which of the following would be
the PRIMARY role of the help desk in the incident response process?
A. Documentation
B. Troubleshooting
C. Escalation
D. Declaration of an incident
Answer: D
Which of the following would provide the MOST helpful information when developing a prioritized list of IT
assets to protect in the event of an incident?
Answer: A
The PRIMARY advantage of a network intrusion detection system (IDS) is that it can:
B.
Answer: D
Which of the following would BEST mitigate identified vulnerabilities in a timely manner?
Answer: D
A. Industry standards
B. Regulatory requirements
C. Risk appetite
D. Threat environment
Answer: D
What is the BEST way for an information security manager to maintain continuous insight into the
effectiveness of the organization's information security program?
C.
Answer: B
An organization involved in e-commerce activities operating from its home country opened a new office in
another country wit! stringent security laws. In this scenario, the overall security strategy should be based on:
Answer: C
Which of the following is the MOST important incident management consideration for an organization
subscribing to a cloud service?
Answer: A
Which of the following would be the BEST course of action to address a privileged user's unauthorized
modifications to a security application?
Answer: C
Which of the following is the GREATEST benefit of information asset classification to an organization?
Answer: B
An information security manager has identified multiple areas of compliance risk that could subject the
organization to significant penalties regarding the handling of personal data. Which of the following is the
manager s BEST course of action?
A. Immediately update the information security policy to address protection of personal data
D. Seek human resources advice to make appropriate changes to the information security policy.
Answer: C
Which of the following provides the BEST justification for an information security investment when creating
a business case
A. The investment can be managed using the organisation's established system development life cycle.
B. Key risk indicators (KRIs) are available to measure the effectiveness and efficiency of the investment
C. The annualized loss expectancy (ALE) is greater than the annual cost of the investment.
D.
D. The investment reduces the protected asset s inherent risk below the asset s residual risk
Answer: C
An organization planning to contract with a cloud service provider is concerned about the risk of account
hijacking at login. What is MOST important for the organization in its security requirements to address this
concern?
Answer: C
Which of the following is the MOST important reason to develop an organizational threat profile?
Answer: B
An information security manager is planning to purchase a mobile device management (MDM) system to
manage personal devices used by employees to access corpor Which of the following is MOST important to
include in the business case?
B. Cost-benefit analysis
Answer: B
A new privacy regulation is due to take effect in a region where an organization does business. Which of the
following would be MOST helpful in understanding what .. needs to do to maintain compliance?
B. Vulnerability assessment
C. Gap analysis
Answer: C
An information security manager has been informed of a new vulnerability in an online banking application,
and a patch to resolve this issue is expected to be released in the next 72 hours. The information security
manager s MOST important course of action is to:
Answer: C
When an organization and its IT-hosting service provider are establishing a contract with each other, it is
MOST important that the
contract includes:
B.
Answer: A
Answer: B
Internal audit has reported a number of information security issues which are not in compliance with
regulatory requirements. What should the information security manager do FIRST?
Answer: D
Which of the following is the MOST important consideration when developing an incident management
program?
A. IT architecture
B. Impact assessment
C. Risk assessment
D. Escalation procedures
Answer: D
The MOST effective way to continuously monitor an organization's cybersecurity posture is to evaluate its
Answer: D
What is a potential issue when emails are encrypted and digitally signed?
Answer: A
Which of the following would BEST detect malicious damage arising from an internal threat?
B. Job rotation
D. Encryption
Answer: B
After a risk has been mitigated, which of the following is the BEST way to help ensure residual risk remains
within an organization's established risk tolerance?
Answer: B
When introducing security measures into a software development life cycle, which of the following should be
the FIRST step?
C. Perform benchmarking.
Answer: C
Which of the following is the MOST important element of an effective external information security
communication plan?
A. Regulatory compliance
Answer: A
Which of the following is the MOST effective way to communicate information security risk to senior
management?
B. Heat map
C. Balanced scorecard
Answer: B
Which of the following should be the MOST important criteria when defining data retention policies?
A. Regulatory requirements
C. Audit findings
D. Capacity requirements
Answer: A
Which of the following is the MOST important element of a response plan for IT security incidents?
Answer: A
The BEST way to identify the criticality of systems to the business is through:
A. a vulnerability assessment.
B. a threat assessment.
C. an impact assessment.
D. an asset classification.
Answer: C
Which of the following is MOST critical for the successful implementation of an information security
strategy?
Answer: D
Which of the following should be the PRIMARY consideration when creating a business continuity plan
(BCP)?
Answer: B
An IT department has given a vendor remote access to the internal network for troubleshooting network
performance problems. After discovering the remote activity during a firewall log review, which of the
following is the FIRST course of action for an information security manager?
Answer: A
Which of the following should an incident response team do NEXT after validating an event is an incident?
D. Escalate to management
Answer: A
When reporting to senior management on an information security vulnerability that could lead to a potential
breach, what information is MOST likely to facilitate the decision-making process?
A. Cost to remediate
C. Business impact
D. Regulatory requirements
Answer: C
Following a risk assessment new countermeasures have been approved by management. Which of the
Answer: C
Which of the following is an information security manager's MOST important consideration during the
investigative process of analyzing the hard drive of 3 compromises..
Answer: D
With limited resources in the information security department which of the following is the BEST approach
for managing security risk?
Answer: D
A financial institution's privacy department has requested the implementation of multi-factor authentication to
comply with regulations for providing services over the Internet. Which of the following authentication
schemes would BEST meet this compliance requirement?
Answer: D
A system administrator failed to report a security incident where the critical application server was not
available to the business users. Which of the following is the BEST way to prevent a reoccurrence?
Answer: D
Following a recent acquisition, an information security manager has been requested to address the outstanding
risk reported early in the acquisition process. Which of the following is the manager s BEST course of action?
Answer: C
Which of the following would BEST ensure that application security standards are in place?
A. Penetration testing
C. Functional testing
Answer: B
Which of the following should be the FIRST course of action when it becomes apparent that the recovery time
objective (RTO) will not be met during incident response
Answer: C
Answer: A
Answer: B
Organization XYZ. a lucrative, Internet-only business, recently suffered a power outage that lasted 2 hours.
The organization s data center was unavailable in the interim. In order to mitigate risk in the MOST
cost-efficient manner, the organization should:
Answer: B
Which of the following is the MOST important reason for performing a risk analysis?
Answer: A
During the due diligence phase of an acquisition, the MOST important course of action for an information
security manager is to:
B.
Answer: A
B. regulatory requirements
Answer: A
Which of the following would BEST help to ensure an organization s security program is aligned with
business objectives?
C. Security policies are reviewed and approved by the chief information officer.
D. The security strategy it reviewed and approved by the organization s executive committee.
Answer: D
Which of the following would be an information security manager's BEST course of action upon learning a
third-party cloud provider is not meeting information security with regard to data encryption?
C.
Answer: A
To address the issue that performance pressures on IT may conflict with information security controls, it is
MOST important that:
Answer: A
An organization's operations have been significantly impacted by a cyber attack resulting in data loss. Once
the attack has been contained, what should the security team.
Answer: A
Which of the following is the PRIMARY objective of the incident management process?
Answer: B
Which of the following is the PRIMARY objective of implementing an information security strategy?
Answer: D
There are concerns that security events are not reported to management in a timely manner. To address this
situation which of the following is MOST important to review?
C. Control ownership
Answer: D
The MOST important reason that security risk assessments should be conducted frequently throughout an
organization is because:
Answer: A
To gain a clear+ understanding of the impact that a new regulatory requirement will have on an organization s
information security controls, an information security manager should FIRST:
Answer: D
Which of the following is the MOST useful input for an information security manager when refreshing the
organizations security strategy?
Answer: C
Which of the following is the BEST way to facilitate the alignment between an organization's information
security program and business objectives?
B. The chief executive officer reviews and approves the information security program.
C. The information security governance committee includes representation from key business areas.
D. Information security is considered at the feasibility stage of all I Perform a business impact analysisT
projects
Answer: C
Human resources is evaluating potential Software as a Service (SaaS) cloud services, Which of the following
should the information security manager do FIRST to support..
Answer: D
Which of the following would BEST enable management to be aware of an electronic breach to an externally
hosted database?
Answer: B
A review of a number of recent XT system rollouts identified a failure to incorporate security within planning,
development and implementation. Which of the following is the MOST effective way to prevent a recurrence
for future systems?
Answer: A
Which of the following BEST indicates that an information security strategy is aligned to the business
strategy?
Answer: A
Which of the following is the BEST evidence that proper security monitoring controls are in place?
Answer: D
Reviewing security objectives and ensuring the integration of security across business units is PRIMARILY
the focus of the:
A. executive management
C. steering committee.
D. board of directors.
Answer: C
Which of the following provides the BEST evidence that a recently established information security program
is effective?
Answer: C
Which of the following would present the GREATEST challenge to integrating information security
governance into corporate governance?
Answer: A
Which of the following BEST measures the effectiveness of an organization's information security strategy?
Answer: A
Which of the following is the MOST effective way for senior management to support the integration of
information security governance into corporate governance?
Answer: A
Which of the following is MOST helpful to review to gain an understanding of the effectiveness of an
organization s information security program?
B. Cost-benefit analysis
D. Balanced scorecard
Answer: C
Which of the following is the MOST important consideration of the information security manager to ensure
effective security monitoring of outsourced operations?
D. Monitoring security incidents and periodic security reports from the outsourcing vendor
Answer: C
Which of the following should be used to attain sustainable and continuous information security process
improvement?
A. Annual audit
C. Balanced scorecard
Answer: B
D. optimization of IT resources
Answer: B
Which of the following would BEST fulfill a board of directors' request for a concise
C. Balanced scorecard
D. Risk register
Answer: D
After assessing risk, the decision to treat the risk should be based PRIMARILY on:
A.
Answer: A
Which of the following is MOST important to consider when developing a security awareness program in an
organization?
A. Industry benchmarks
Answer: C
Which of the following should be the PRIMARY factor in prioritizing responses to a security incident?
A. Cost of mitigation
C. Asset classification
D. Incident location
Answer: C
Which of the following is the PRIMARY benefit to an organization using an automated event monitoring
solution?
Answer: D
Which of the following is MOST useful to include in a report to senior management on a regular basis to
demonstrate the effectiveness of the information security program?
Answer: C
Which of the following is MOST important to consider when developing a disaster recovery plan?
C. Cost-benefit analysis
D. Feasibility assessment
Answer: B
An organization us& a particular encryption protocol for externally facing web pages and key financial
services. A security firm publicizes a critical security flaw in the encryp manager do FIRST?
Answer: A
Which of the following tools BEST demonstrates the effectiveness of the information security program?
Answer: A
In which of the following situations is it MOST important to escalate an incident response to senior
management?
B. The time-related service levels for response are below risk threshold levels.
Answer: C
An organization implemented a mandatory information security awareness training program a year ago. What
is the BEST way to determine its effectiveness?
Answer: D
Which of the following is MOST important when selecting an information security metric?
Answer: B
Which of the following is MOST important for an information security manager to consider when developing
a new information security policy?
Answer: A
Which of the following is the PRIMARY benefit of using a tabletop method to conduct an incident response
exercise?
Answer: D
Which of the following is the FlRST step to promoting acceptable behavior with regard to information security
throughout an organization?
Answer: A
Which of the following is the MOST relevant source of information for determining the available internal
human resources for executing the information security program?
B. Job descriptions
C. Skills inventory
D. RACl chart
Answer: C
Which of the following would BEST help to ensure compliance with an organizations information security
requirements by an IT service provider?
Answer: D
An audit reveals that some of an organizations software is end-of-life and the vendor will no longer provide
support or security patches. Which of the following is the BEST way for the information security manager to
address this situation?
Answer: C
The BEST way to establish a recovery time objective (RTO) that balances cost with a realistic recovery time
frame is to:
Answer: B
A. New legislation has been enacted in a region where the organization does business.
D.
Answer: A
Which of the following should the information security manager do FIRST after a security incident has been
reported?
Answer: A
A recent audit has identified that security controls required by the organization's policies have not been
implemented for a particular application. What should the information security manager do NEXT to address
this issue?
A. Discuss the issue with data owners to determine the reason for the exception.
B. Discuss the issue with data custodians to determine the reason for the exception.
C. Report the issue to senior management and request funding to fix the issue
Answer: A
Which of the following is the FIRST task when determining an organization's information security profile?
Answer: A
Which of the following is the PRIMARY product of a business impact analysis (BIA)?
Answer: D
An organization s HR department would like to outsource its employee management system to a cloud-hosted
solution due to features and cost savings offered. Management has identified this solution as a business need
and wants to move forward. What should be the PRIMARY role of information security in this effort?
Answer: C
Which of the following is the MOST effective way to ensure security policies are relevant to organizational
business practices?
Answer: C
A cloud service provider is unable to provide an independent assessment of controls. Which of the following is
the BEST way to obtain assurance that the provider can adequately protect the organization's information?
Answer: D
Which of the following should an information security manager do FIRST when an organization plans to
migrate all internally hosted applications to the cloud?
Answer: A
What is the BEST way to manage access to data and applications for large user bases?
Answer: D
A recent phishing attack investigation showed that several employees had used their work email addresses to
create personal accounts on a shopping site that had been breached. What is the BEST way to prevent this
Answer: C
An organization is the victim of a targeted attack, and is unaware of the compromise until a security analyst
notices an additional user account on the firewall. The implementation of which of the following would have
detected the incident?
Answer: C
An organization establishes an internal document collaboration site. To ensure data confidentiality of each
project group, it is MOST important to:
Answer: A
Which of the following is the MOST important consideration when designing information security
architecture?
Answer: C
A. IT strategy
B. Security strategy
D. Recovery strategy
Answer: C
Which of the following is the BEST approach for determining the maturity level of an information security
program?
D. Perform a self-assessment.
Answer: A
Which of the following is the BEST way to provide management with meaningful information regarding the
performance of the information security program against strategic objectives?
Answer: D
During an annual security review of an organizations servers, it was found that the customer service team's file
server, which contains sensitive customer data, is accessible to all user IDs in the organization. Which of the
following should the information security manager do FIRST?
Answer: A
Which of the following is MOST helpful to management in determining whether risks are within an
organization's tolerance level?
A. Audit findings
B. Maturity level
C. Heat map
Answer: C
An information security manager reads a media report of a new type of malware attack. Who should be
notified FIRST"
B. Application owners
C. Data owners
D. Communications department
Answer: A
Which of the following is MOST important to the successful implementation of an information security
governance framework across the organization?
Answer: B
When developing an information security governance framework, which of the following should be the FIRST
activity?
A. Align the information security program with the organization's other risk and control activities.
C. Develop response measures to detect and ensure the closure of security breaches.
Answer: A
Which of the following practices BEST supports the achievement of information security program objectives
in the IT function?
Answer: D
It is MOST important tot an information security manager to ensure that security risk assessments are
performed:
Answer: C
Which of the following is the MOST effective way to ensure the information security risk associated with
third-party services is addressed?
Answer: A
A business unit has updated its long-term business plan to include a strategy of upgrading information
management system to increase productivity. To support this initiative, with the information security strategy?
C.
C. The IT strategy
Answer: D
Which of the following is the PRIMARY purpose of conducting a business impact analysis (BIA)?
Answer: A
When preparing a disaster recovery plan, which of the following would BEST help in prioritizing the
restoration of business systems?
Answer: A
Which of the following is the MOST important requirement for the successful implementation of security
governance?
Answer: D
Answer: C
Which of the following is the BEST evidence that information security governance works as a business
enabler?
Answer: A
What should an information security manager do NEXT when management does not accept control
recommendations resulting from a risk assessment?
C. Perform a reassessment.
Answer: B
Several significant risks have been identified after a centralized risk register was compiled and prioritized. The
information security manager's MOST important action is to:
Answer: A
An organization has experienced a ransomware attack. Which of the following is the BEST course of action to
prevent further attacks?
Answer: B
A. Classifying information
B. Securing information
C. Validating information
D. Processing information
Answer: B
As the security program matures, which of the following reports presented to senior management provides the
Answer: C
Which of the following is the BEST indication of an effective information security program?
Answer: D
Which of the following is the GREATEST benefit of a comprehensive set of security program metrics?
Answer: B
What should be an information security manager's FIRST step when developing a business case for a new
intrusion detection system (IDS) solution?
Answer: B
Which of the following BEST supports the risk assessment process to determine criticality of an asset?
A. Threat assessment
B. Vulnerability assessment
Answer: C
In the absence of technical controls, what would be the BEST way to reduce unauthorized text messaging on
company-supplied mobile devices?
B. Conduct a business impact analysis (BIA) and provide the report to management
D. Stop providing mobile devices until the organization is able to implement controls.
Answer: A
D.
Answer: D
What should the information security manager do FIRST when end users express that new security controls
are too restrictive?
Answer: D
An investigation of a recent security incident determined that the root cause was negligent handling of incident
alerts by system administrators. What is the BEST way for the information security manager to address this
issue?
C. Conduct a risk assessment and share the results with senior management.
Answer: C
Which of the following is the BEST way to rigorously test a disaster recovery plan for a mission-critical
system without disrupting business operations?
A. Simulation testing
B. Checklist review
C. Structured walk-through
D.
D. Parallel testing
Answer: A
A business unit has updated its long-term business plan to include a strategy of upgrading information
management systems to increase productivity. To support this initiative, what should be the PRIMARY basis
for updating the corresponding. information security strategy?
C. The IT strategy
Answer: D
A new mobile application is unable to adhere to the organization's authentication policy. Which of the
following would be the information security manager's BEST course of activity----
Answer: C
Answer: A
Which of the following is the MOST important outcome of monitoring and reporting on information security
processes?
Answer: A
Which of the following is the BEST way to prevent segregation of duties violations?
Answer: C
Which of the following is the GREATEST security threat when an organization allows remote access through
a virtual private network (VPN)?
Answer: C
Which of the following is the MOST important part of an incident response plan?
Answer: A
An information security manager has identified the organization is not in compliance with new legislation that
will soon be in effect. Which of the following is MOST important to consider when determining additional
controls to be implemented?
Answer: D
D. Audit reports
Answer: C
Which of the following is the BEST way for an information security manager to justify continued investment
in the information security program when the organization is facing significant budget cuts?
Answer: B
Which of the following incident response team (IRT) models is ideal for an organization that is regionally
managed'
A. Coordinating IRT
B. Distributed IRT
C. Geographical IRT
D. Central IRT
Answer: B
A. Two-factor authentication
B. Receipt acknowledgment
C. Third-party certificates
D. Periodic reaccreditations
Answer: B
Which of the following is MOST important when establishing effective information security metrics?
B.
Answer: C
A. Segregation of responsibilities
D. a warning banner
Answer: A
Which of the following provides the BEST preparation for handling the breach of a corporate web site?
Answer: A
Which of the following is the MOST important characteristic of an effective security policy?
Answer: C
What should be the PRIMARY objective of conducting interviews with business unit managers when
developing an information security strategy?
Answer: B
Which of the following is MOST important for an information security manager to include in a report to senior
management following a post-incident review?
A. Lessons learned
D. Detailed metrics
Answer: A
The GREATEST benefit of using a maturity model when providing security reports to management is that it
presents the:
Answer: B
Which of the following is an information security manager's BEST course of action upon identification of a
shadow IT application being used by a business unit?
Answer: C
Which of the following BEST indicates that information security will be considered when new IT technologies
are implemented across an organization?
Answer: B
Which of the following would be the MOST important information to include in a business case for an
information security project in a highly regulated industry?
Answer: C
The integration of information security risk management processes within corporate risk management
processes will MOST likely result in:
Answer: B
An organization plans to leverage popular social network platforms to promote its products and services.
Which of the following is the BEST course of action for the information security manager to support this
initiative?
C. Assess the security risk associated with the use of social networks
Answer: B
Which of the following is the MOST important outcome of a well-implemented awareness program?
Answer: B
Which of the following is the MOST effective approach to communicate general information security
responsibilities across an organization?
Answer: D
An organization enacted several information security policies to satisfy regulatory requirements. Which of the
following situations would MOST likely increase the probability of noncompliance to these requirements?
Answer: B
Which of the following is MOST important for an information security manager to ensure is included in a
business case for a new security system?
B. Benchmarking results
C. Effectiveness of controls
D. Audit-logging capabilities
Answer: A
An information security manager has observed multiple exceptions for a number of different security controls.
Which of the following should be the information security manager's FIRST course of action?
Answer: B
Answer: C
A legacy application does not comply with new regulatory requirements to encrypt sensitive data at rest, and
remediating this issue would require significant investment. What should the information security manager do
FIRST?
Answer: D
Answer: A
When an operating system is being hardened, it is MOST important for an information security manager to
ensure that
D.
Answer: B
Answer: B
Which of the following is the PRIMARY benefit of using agentless endpoint security solutions?
B. Decreased administration
C. Increased resiliency
Answer: B
Which of the following provides the MOST comprehensive understanding of an organization's information
security posture?
Answer: A
Which of the following metrics is the BEST measure of the effectiveness of an information security program?
Answer: B
The MOST important reason for an information security manager to be involved in the change management
process is to ensure that:
Answer: D
When management changes the enterprise business strategy, which of the following processes should be used
to evaluate the existing information security controls as well as to select new information security controls?
A. Change management
C. Configuration management
D. Risk management
Answer: C
Which of the following is MOST critical for prioritizing actions in a business continuity plan (BCP)?
A. Asset classification
B. Risk assessment
Answer: D
An organization that has outsourced its incident management capabilities just discovered a significant privacy
breach by an unknown attacker. Which of the following is the MOST important action of the information
security manager?
Answer: B
Which of the following is the BEST evidence that an organization's information security governance
framework is effective?
Answer: A
A. Technology constraints
B. Regulatory requirements
C. Litigation potential
D. Business strategy
Answer: D
A security incident has resulted in a failure of the enterprise resource planning (ERP) system. While the
incident is handled by the incident response team, the help desk is overrun by queries from department
managers on the state of the ERP system. What is the MOST likely reason for this situation?
Answer: B
Question #:15 - (Exam Topic 6)
The PRIMARY objective for using threat modeling in web application development should be to:
Answer: B
Which of the following will BEST provide an organization with ongoing assurance of the information security
services provided by a cloud provider?
Answer: D
When designing an incident response plan to be agreed upon with a cloud computing vendor, including which
of the following will BEST help to ensure the effectiveness of the plan?
Answer: A
Who should decide the extent to which an organization will comply with new cybersecurity regulatory
requirements?
B. Legal counsel
C. Senior management
D. IT steering committee
Answer: C
An organization's information security manager will find it MOST difficult to perform a post-incident review
of a data leakage event when it is related to:
Answer: B
Question #:20 - (Exam Topic 6)
Senior management has just accepted the risk of noncompliance with a new regulation. What should the
information security manager do NEXT?
Answer: A
Establishing which of the following is the BEST way of ensuring that the emergence of new risk is promptly
identified?
Answer: B
Question #:22 - (Exam Topic 6)
An organization's information security manager has learned that similar organizations have become
increasingly susceptible to spear phishing attacks. What is the BEST way to address this concern?
A. Create a new security policy that staff must read and sign.
Answer: B
Which of the following is the MOST effective control to reduce the impact of ransomware attacks?
A. Antivirus software
C. Backup strategy
Answer: C
Which of the following is the BEST mechanism to prevent data loss in the event personal computing
equipment is stolen or lost?
A. Data encryption
C. Personal firewall
Answer: A
An organization is considering moving one its critical business application to a cloud hosting service. The
cloud provider may not provider the same level of security for its application as the organization. Which of the
following will provide the BEST information to help maintain the security posture?
A. Risk assessment
B. Vulnerability assessment
Answer: A
Which of the following outsourced services has the GREATEST need for security monitoring?
A. Application development
B. Enterprise infrastructure
Answer: B
Which of the following is MOST critical for responding effectively to security breaches?
A. Counterattack techniques
C. Management communication
D. Evidence gathering
Answer: B
Answer: A
An external security audit has reported multiple instances of control noncompliance. Which of the following is
MOST important for the information security manager to communicate to senior managements.
C.
Answer: D
Which of the following is the MOST effective method for categorizing system and data criticality during the
risk assessment process?
Answer: A
Which of the following is the MOST important prerequisite to performing an information security risk
assessment?
A. Classifying assets
Answer: A
Which is the MOST important driver for effectively communicating the progress of a new information
security program's implementation to key stakeholders?
D.
Answer: C
Explanation
32:35
An organization is developing a disaster recover/ plan for a data center that hosts multiple applications. The
application recovery sequence would BEST be determined through an analysis of:
Answer: C
The MOST important reason that security risk assesements should be conducted frequently through an
organization is because:
Answer: A
Which of the following is the PRIMARY reason for performing an analysis of the threat landscape on a
regular basis?
Answer: C
In an organization implementing a data classification program, ultimate responsibility for the data on the
database server lies with the:
A. database administrator
Answer: C
A. regulatory compliance.
D. threat reduction.
Answer: B
When supporting an organization's privacy officer, which of the following is the information security
managers PRIMARY role regarding privacy requirements?
Answer: B
When supporting a large corporation's board of directors in the development of governance, which of the
following is the PRIMARY function of the information security manager?
Answer: A
Which of the following is MOST likely to reduce the effectiveness of a signature-based intrusion detection
system (IDS)?
Answer: D
Which of the following is the PRIMARY advantage of having an established information security governance
framework in place when an organization is adopting emerging technologies?
Answer: D
Management decisions concerning information security investments will be MOST effective when they are
based on:
A. an annual loss expectancy (ALE) determined from the history of security events.
Answer: D
A. Defective software
B. Natural disasters
C. Unauthorized users
D. Ransomware
Answer: A
Answer: A
In a risk assessment after the identification of threats to organizational assets, the information security
manager would:
Answer: D
Answer: C
Which of the following processes would BEST aid an information security manager in resolving systemic
security issues?
B. Security reviews
Answer: D
Which of the following is the MOST effective way of ensuring that business units comply with an information
security governance framework?
Answer: B
Which of the following enables compliance with a nonrepudiation policy requirement for electronic
transactions?
A. Digital signatures
B. One-time passwords
C. Encrypted passwords
D. Digital certificates
Answer: A
An organization s senior management wants to allow employees to access an internal application using their
personal mobile devices. Which of the following should be the information security managers FIRST course
of action?
Answer: D
When responding to an incident, which of the following is required to ensure evidence remains legally
admissible in court?
D. Chain of custody
Answer: D
A risk analysis for a new system is being performed. For which of the following is business knowledge MORE
important than IT knowledge?
A. Vulnerability analysis
B. Balanced scorecard
C. Cost-benefit analysis
D. Impact analysis
Answer: D
Answer: B
Answer: A
An information security manager is asked to provide evidence that the organization is fulfilling its legal
obligation to protect personal identifiable information (Pll). Which of the f<
Answer: A
Which of the following will BEST facilitate the understanding of information security responsibilities by users
across the organization?
Answer: A
Which of the following security characteristics is MOST important to the protection of customer data in an
online transaction system?
A. Data segregation
B. Audit monitoring
C. Availability
D. Authentication
Answer: D
A hacking group has posted an organization's employee data on social media. What should the information
security manager do FIRST?
Answer: D
Application data integrity risk would be MOST directly addressed by a design that includes:
D. application log requirements such as field-level audit trails and user activity logs.
Answer: C
Explanation
QUESRTION NO: 143
Which of the following metrics BEST evaluates the completeness of disaster-recovery preparations?
Answer: A
Which of the following is MOST relevant for an information security manager to communicate to the board of
directors?
A. Vulnerability assessments
C. Threat assessments
Answer: B
The risk of mishandling alerts identified by an intrusion detection system (lDS) would be the GREATEST
when:
Answer: D
Adding security requirements late in the software development life cycle (SDLC) would MOST likely result
in:
B. operational efficiency.
C. compensating controls.
D. cost savings.
Answer: C
Which of the following would BEST help to ensure an organization's information security strategy is aligned
with business objectives?
Answer: A
Which of the following would be MOST helpful to reduce the amount of time needed by an incident response
team to determine appropriate actions?
B. Providing annual awareness training regarding incident response for team members
Answer: A
When determining an acceptable risk level, which of the following is the MOST important consideration?
A. Risk matrices
B. Vulnerability scores
C. System criticality
D. Threat profile
Answer: D
Which of the following is the MOST beneficial outcome of testing an incident response plan?
Answer: A
Which of the following should be the PRIMARY consideration when developing a security governance
framework for an enterprise?
Answer: D
Which of the following should be the FIRST step to ensure system updates are applied in a timely manner?
A. Run a patch management scan to discover which patches are missing from each machine.
C. Cross-reference all missing patches to establish the date each patch was introduced.
Answer: D
An information security manager is preparing an incident response plan. Which of the following is the MOST
important consideration when responding to an incident involving sensitive customer data?
B.
Answer: B
Answer: C
A new organization has been hit with a ransomware attack that is critically impacting its business operations.
The organization does not yet have a proper incident response plan, but it does have a backup procedure for
restoration of data. Which of the following should be the FIRST course of action?
Answer: D
The MOST likely reason to use qualitative security risk assessments instead of quantitative methods is when:
C.
Answer: C
An information security manager is preparing a presentation to obtain support for a security initative. Which of
the following is the BEST way to obtain management's commitment for the initiative?
Answer: A
Question #:74 - (Exam Topic 6)
A large organization is considering a policy that would allow employees to briog their own smartphones into
the organizational environment. The MOST important concern to the information security manager should be
the:
Answer: C
An information security manager is implementing controls to protect the organization's data. The FIRST step
in this process should be to:
Answer: A
Which of the following is the PRIMARY purpose for establishing a bring your own device (BYOD) policy
that only permits application downloads from designated online markets.
Answer: B
What should be an information security manager's FIRST course of action upon learning of a security threat
that has occurred in the industry for the first time?
Answer: D
An information security manager has implemented an ongoing security awareness training program. Employee
participation has been decreasing over the year, while the number of malware and phishing incidents from
email has been increasing. What is the information security manager's BEST course of action?
B. Make the training program mandatory and enforce sanctions for noncompliance.
Answer: B
What should an information security team do FIRST when notified by the help desk that an employee's
computer has been infected with ma I ware?
Answer: A
Following a malicious security incident, an organization has decided to prosecute those responsible. Which of
the following will BEST facilitate the forensic investigation?
Answer: D
Which of the following should be reviewed to obtain a structured overview of relevant information about an
information security investment?
C. Business case
Answer: C
Failure to include information security requirements within the build/buy decision would MOST likely result
in the need for:
Answer: C
The BEST way to determine the current state of information security with regard to defined security objectives
is by performing a:
A. cost-benefit analysis.
C. gap analysis.
D. risk assessment.
Answer: C
Which of the following MUST be established before implementing a data loss prevention (DLP) system?
C. Data classification
Answer: C
Which of the following metrics would BEST determine the effectiveness of an application security testing
program?
Answer: D
When evaluating vendors for sensitive data processing, which of the following should be the FIRST step to
ensure the correct level of information security is provided?
Answer: D
When developing security standards, which of the following would be MOST appropriate to include?
C. Inventory management
Answer: D
A business unit manager wants to adopt an emerging technology that may affect the organization. Which of
the following would be the information security manager's BEST course of action?
Answer: D
Which of the following is the BEST way to determine if an organization's current risk level is within the risk
appetite?
Answer: A
An internal audit has found that critical patches were not implemented within the timeline established by
policy without a valid reason. Which of the following is the BEST course of action to address the audit
findings?
Answer: D
Answer: C
Which of the following should be the FIRST step to ensure an information security program meets the
requirements of new regulations?
Answer: A
Question #:93 - (Exam Topic 6)
An organization is considering whether to allow employees to use personal computing devices for business
purposes To BEST facilitate senior management's decision, the information security manager should:
Answer: B
Ensuring that activities performed by outsourcing providers comply with information security policies can
BEST be accomplished through the use of:
A. contractual obligations.
B. Independent audits
Answer: B
Which of the following needs to be established between an IT service provider and its clients to BEST enable
adequate continuity of service in preparation for an outage?
Answer: C
What should be the PRIMARY basis for establishing a recovery time objective (RTO) for a critical business
application?
Answer: B
The PRIMARY purpose of aligning information security with corporate governance objectives is to:
Answer: D
Which of the following is the BEST way to identify the potential impact of a successful attack on an
organization's mission critical applications?
Answer: A
An information security manager has been tasked with developing materials to update the board, regulatory
agencies, and the media about a security incident. Which of the following should the information security
manager do FIRST?
Answer: D
An information security manager has been alerted to a possible incident involving a breach at one of the
organization's vendors. Which of the following should be done FIRST?
Answer: B
Which of the following should be the PRIMARY consideration when selecting a recovery site?
C. Geographical location
D. Regulatory requirements
Answer: A
What is the PRIMARY benefit to executive management when audit risk, and security functions are aligned?
Answer: A
Which of the following BEST describes an intrusion detection system (IDS) that learns the system behaviors
prior to detecting potential intrusions?
A. Host-based IDS
B. Anomaly-based IDS
C. Network-based IDS
D. Application-based IDS
Answer: B
Question #:104 - (Exam Topic 6)
In an organization where IT is critical to its business strategy and where there is a high level of operational
dependence on IT, senior management commitment to security is BEST demonstrated by the:
C.
Answer: B
B. priority of restoration.
D. point of synchronization
Answer: B
Which of the following should be done FIRST when handling multiple confirmed incidents raised at the same
time?
Answer: A
From a business perspective the MOST important function of information security is to support:
A. predictable operations.
B. international standards
C. security awareness
D. corporate policy
Answer: A
When preventative controls to appropriately mitigate risk are not feasible, which of the following is the MOST
important action for the information security manager to perform?
B. Assess vulnerabilities.
Answer: D
An organization has concerns regarding a potential advanced persistent threat (APT). To ensure that the risk
associated with this threat is appropriately managed, what should be the organization 5 FIRST action?
Answer: D
Answer: D
Which of the following is MOST important for an information security manager to consider when identifying
information security resource requirements?
Answer: B
Which type of test is MOST effective in communicating the roles of end users to support timely identification
and response to information security incidents?
A. Simulation
B. Walk-through
C. Parallel
D. Complete failover
Answer: A
An information security manager terms that the root password of an external FTP server may be subject to
brute force attacks. Which of the following would be the MOST appropriate way to reduce the likelihood of a
successful attack?.
Answer: A
Answer: B
An IT department plans to migrate an application to the public cloud. Which of the following is the
information security manager's MOST important action in support of this initiative?
Answer: B
Question #:116 - (Exam Topic 6)
Which of the following BEST demonstrates effective information security management within an
organization?
D. Control ownership is assigned to parties who can accept losses related to control failure.
Answer: C
B.
C. Password carelessness by one user may render the entire infrastructure vulnerable
D. One administrator maintains the single sign-on solutions without segregation of duty.
Answer: B
Which of the following is the BEST way to demonstrate to senior management that organizational security
practices comply with industry standards?
Answer: D
Which of the following is the- BEST method to determine whether an information security program meets an
organization s business objectives?
Answer: A
When establishing the trigger levels for an organization's key risk indicators (KRIs), the thresholds should be
based PRIMARILY on the organization's:
A. risk register.
B. risk appetite.
Answer: B
Which of the following is the BEST way to ensure information security metrics are meaningful?
Answer: B
Which of the following should be of GREATEST concern to a newly hired information security manager
regarding security compliance?
Answer: D
Which of the following is the MOST important factor when determining the frequency of information security
risk reassessment?
A. Risk priority
B. Risk metrics
C. Mitigating controls
D. Audit findings
Answer: A
Web application firewalls are needed in addition to other intrusion prevention and detection technology
PRIMARILY because:
Answer: D
Cold sites for disaster recovery events are MOST helpful in situations in which a company:
Answer: C
Which of the following would provide senior management with the BEST information to better understand the
organization's information security risk profile?
Answer: A
Answer: B
Which of the following BIST validates that security controls are implemented in a new business process?
D. Review the process for conformance with information security best practices
Answer: A
Which of the following should be of GREATEST concern to an information security manager when
establishing a set of key risk indicators (KRIs)?
Answer: B
When creating an information security governance program, which of the following will BEST enable the
organization to address regulatory compliance requirements?
Answer: B
Which of the following defines the minimum security requirements that a specific system must meet?
A. Security baseline
B. Security procedure
C. Security policy
D. Security guideline
Answer: A
Deciding the level of protection a particular asset should be given is BEST determined by:
A. a risk analysis.
B. a threat assessment.
C. a vulnerability assessment
Answer: D
Using which of the following metrics will BEST help to determine the resiliency of IT infrastructure security
controls?
C.
Answer: C
An information security manager has discovered a potential security breach in a server that supports a critical
business process. Which of the following should be the information security manager's FIRST course of
action?
Answer: D
An organization has implemented a new customer relationship management (CRM) system. Who should be
responsible for enforcing authorized and controlled access to the CRM data?
A. Internal II audit
Answer: C
Answer: D
An information security manager has been asked to identify potential threats to the organization's information.
Which of the following should be done FIRST'
Answer: A
When preparing a strategy for protection from SQL injection attacks, it is MOST important for the information
security manager to involve:
B. business owners.
C. application developers.
D. senior management.
Answer: C
Answer: D
Which of the following is the BEST way for an organization that outsources many business processes to gain
assurance that services provided are adequately secured?
Answer: A
Which of the following BEST enables a more efficient incident reporting process?
Answer: D
Explanation
QUESRTION NO: 136
Which of the following is MOST likely to be included in an enterprise information security policy?
B. Consequences of noncompliance
Answer: B
A new mobile application is unable to adhere to the organization's authentication policy. Which of the
Answer: A
Answer: A
Which of the following should be the PRIMARY consideration for an information security manager when
designing security center for a newly acquired business application?
Answer: B
Which of the following would BEST support a business case to implement a data leakage prevention (DLP)
solution?
Answer: C
When establishing classifications of security incidents for the development of an incident response plan, which
of the following provides the MOST valuable input?
Answer: B
When drafting the corporate privacy statement for a public web site, which of the following MUST be
included?
Answer: C
Which of the following is the STRONGEST indicator of effective alignment between corporate governance
and information security governance?
C.
Answer: B
Which of the following is MOST important for an information security manager to communicate to senior
management regarding the security program?
Answer: B
Key systems necessary for branch operations reside at corporate headquarters. Branch A is negotiating with a
third party to provide disaster recovery facilities. Which of the following contract terms would be the MOST
significant concern?
B. The right to audit the hot site Is not provided In the contract.
Answer: A
Which of the following is the BEST advantage of a centralized information security organizational structure?
Answer: D
Business applications should be selected for disaster recovery testing on the basis of:
Answer: D
Which of the following approaches is BEST for selecting controls to minimize information security risks?
A. Control-effectiveness evaluation
B. Risk assessment
C. Cost-benefit analysis
Answer: C
Which of the following provides the BEST opportunity to evaluate the capabilities of incident response team
members?
D. Tabletop test
Answer: A
Which of the following is MOST important to consider when handling digital evidence during the forensics
investigation of a cybercrime?
B. Local regulations
C. Global standards
D. Business strategies
Answer: B
Which of the following sites is MOST appropriate in the case of a very short recovery time objective (RTO)?
A. Redundant
B. Mobile
C. Warm
D. Shared
Answer: A
When customer data has been compromised, an organization should contact law enforcement authorities:
Answer: B
Which of the following is the KST way to align security and business strategies?
C. Establish key performance indicators (KPls) for business through security processes.
Answer: D
Which of the following is the BEST approach to identify noncompliance issues with legal, regulatory, and
contractual requirements?
A. Risk assessment
B. Gap analysis
C. Vulnerability assessment
Answer: B
An information security manager is implementing a bring your own device (BYOD) program. Which of the
following would BEST ensure that users adhere to the security standards?
Answer: A
Which of the following is the MOST effective method to help ensure information security incidents are
reported?
Answer: B
When multiple Internet intrusions on a server are detected, the PRIMARY concern of the information security
manager should be to ensure that the:
Answer: D
A. a security policy
B. security guidelines
C. security procedures
D. security standards.
Answer: A
An organization is leveraging tablets to replace desktop computers shared by shift-based staff. These tables
contain critical business data and are inherently at increased risk of theft. Which of the following will BEST
help to mitigate this risk?
C.
Answer: D
Which of the following is the BEST reason to initiate a reassessment of current risk?
A. Certification requirements
Answer: C
An organization was forced to pay a ransom to regain access to a critical database that had been encrypted in a
ransomware attack. What would have BEST prevented The need to make this ransom payment?
Answer: A
An information security manager is developing evidence preservation procedures for an incident response
plan. Which of the following would be the BEST source of guidance for requirements associated with the
procedures?
A. Legal counsel
B. Executive management
C. Data owners
D. IT management
Answer: A
During a new user provisioning process, who should have PRIMARY responsibility for determining
appropriate access levels?
A. IT service manager
B. System owner
C. Security staff
Answer: B
An information security manager is asked to provide a short presentation on the organization's current IT risk
posture to the board of directors. Which of the following would be MOST effective To include in this
presentation?
B. Risk register
Answer: D
An organization with a maturing incident response program conducts post-incident reviews for all major
information security incidents. The PRIMARY goal of these reviews should be to:
C. document and report the root cause of the incidents for senior management
Answer: D
Which of the following is the BEST criterion to use when classifying assets?
Answer: D
Which of the following is the MOST important outcome of senior management's analysis of information
security metrics?
Answer: B
An employee is found to be using an external cloud storage service to share corporate information with a
third-party consultant, which is against company policy. Which of the following should be the information
security manager s FIRST course of action?
Answer: D
Which of the following is the GREATEST risk to consider when a rival organization purchases a business unit
within an organization?
A. Access and permissions to the corporate network from the business unit will remain after the sale.
B. The business unit's confidential information will be transferred to the rival organization during the
separation.
Answer: A
A. A program contains a hidden and unintended function that presents a security risk.
C. A function is carried out with more data than the function can handle.
Answer: B
Which of the following is the MOST significant benefit of effective change management?
Answer: C
Question #:177 - (Exam Topic 6)
Which of the following is the MOST critical security risk to consider for a start-up company in an emerging
field?
Answer: A
An organization has a policy in which all criminal activity is prosecuted. What is MOST important for the
information security manager to ensure when an employee is suspected of using a company computer to
commit fraud?
Answer: A
In addition to business alignment and security ownership, which of the following is MOST critical for
information security governance?
A. Auditability of systems
D. Executive sponsorship
Answer: D
Without prior approval, a training department enrolled the company in a free cloud-based collaboration site
and invited employees to use it. Which of the following is the BEST response of the information security
manager?
C. Update the risk register and review the information security strategy.
D. Allow temporary use of the site and monitor for data leakage.
Answer: C
Planning for the implementation of an information security program is MOST effective when it:
Answer: C
Which of the following is MOST important to have in place to help secure ongoing funding for the
information security program?
Answer: D
Which of the following would be MOST helpful in gaining support for a business case for an information
security initiative?
A.
Answer: C
For proper escalation of events, it is MOST important for the information security manager to ensure:
Answer: B
Answer: B
Which of the following is the MOST effective way to achieve the integration of information security
governance into corporate governance?
Answer: B
Which of the following is the MOST important factor to consider when establishing a severity hierarchy for
information security incidents?
A. Regulatory compliance
B. Management support
C. Business impact
D. Residual risk
Answer: C
A business unit uses e-commerce with a strong password policy. Many customers complain that they cannot
remember their password because they are too long and complex. The business unit states it is imperative to
improve the customer experience. The information security manager should FIRST.
Answer: C
When information security management is receiving an increased number of false positive incident reports,
which of the following is MOST important to review?
B. firewall logs
Answer: D
Several significant risks have been identified after a centralized risk register was compiled and prioritized. The
information security manager s MOST important action is to:
Answer: A
A team developing an interface to a key financial system has identified a security flaw in one of the libraries.
Remediating the flaw would require major system redesign. What should the information security manager do
NEXT?
Answer: C
Which of the following circumstances would MOST likely require a review and update to an organization's
information security incident response plan?
Answer: B
In information security governance, the PRIMARY role of the board of directors is to ensure:
Answer: A
Which of the following is the BEST type of access control for an organization with employees who move
between departments?
A. Mandatory
B. Discretionary
C. Role-based
D. Identity
Answer: B
Which of the following provides the GREATEST assurance that an organization allocates appropriate
resources to respond to information security events?
Answer: C
When defining responsibilities with a cloud computing vendor, which of the following should be regarded as a
shared responsibility between user and provider?
A. Data ownership
B. Application logging
C. Incident response
Answer: C
Which of the following is MOST important for an information security manager to regularly report to senior
management?
B. Audit reports
Answer: D
A CEO requests access to corporate documents from a mobile device that does not comply with organizational
policy. The information security manager should FIRST:
Answer: A
Which of the following BEST demonstrates the maturity of an information security monitoring program?
A. The information security program was introduced with a thorough business case.
D. Information security key risk indicators (KRls) are tied to business operations.
Answer: D
Answer: D
Of the following, who should have PRIMARY responsibility for assessing the security risk associated with an
outsourced cloud provider contract?
A. Compliance manager
Answer: D
A newly hired information security manager for a small organization has been tasked with improving data
security. The BEST way to understand the organizations security postuie would be to:
A.
Answer: D
What should be an information security manager's PRIMARY objective in the event of a security incident?
Answer: C
A risk assessment report shows that phishing attacks are an emerging threat for an organization that supports
online financial services. Which of the following is the information security manager's BEST course of action?
Answer: A
An organization's IT department is undertaking a large virtualization project to reduce its physical server
footprint. Which of the following should be the HIGHEST priority of the information security manager?
B.
Answer: C
Which of the following is the BEST approach when using sensitive customer data during the testing phase of a
systems development project?
Answer: D
The PRIMARY reason for implementing scenario-based training for incident response is to:
Answer: B
Answer: C
Who is MOST important to include when establishing the response process for a significant security breach
that would impact the IT infrastructure and cause customer data toss?
Answer: C
The value of information assets relative to the organization is BEST determined by:
A. a risk assessment.
B. an impact analysis.
C. a threat assessment.
D. an asset classification.
Answer: A
A. To develop and enforce a set of security policies aligned with the business
Answer: C
A. regulatory issue.
B. people issue.
C. business issue.
D. process issue.
Answer: C
Which of the following is the MOST important action when using a web application that has recognized
vulnerabilities?
Answer: A
Which of the following is MOST important for an information security manager to highlight when presenting
the organization s security posture to an executive audience?
C. The number of emails blocked by the data loss prevention (DLP) system
Answer: D
Which of the following has the PRIMARY responsibility of ensuring an organizations information security
C. Audit committee
Answer: B
Question #:216 - (Exam Topic 6)
Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST
supports the concept of integrity?
Answer: A
Question #:217 - (Exam Topic 6)
An information security manager that is utilizing a public cloud is performing a root cause investigation of an
incident that took place in that environment. Which of the following should be the security manager’s MAIN
concern?
Answer: D
Explanation
QUESRTION NO: 137
An organization's marketing department has requested access to cloud-based collaboration sites for
exchanging media files with external marketing companies. As a result, the information security manager has
been asked to perform a risk assessment. Which of the following should be the MOST important
consideration?
Answer: D
Which of the following statements indicates that a previously failing security program is becoming successful?
Answer: A
After logging in to a web application, additional authentication is required at various application points. Which
of the following is the PRIMARY reason for such an approach?
Answer: D
Which of the following will identify a deviation in the information security management process from
generally accepted standards of good practices?
A. Gap analysis
B. Penetration resting
C.
C. Risk assessment
D. Business
Answer: A
Question #:221 - (Exam Topic 6)
Which of the following is the BEST way to sustain employee interest in information security awareness in an
organization?
Answer: D
Answer: C
An organization is concerned with the risk of information leakage caused by incorrect use of personally owned
smart devices by employees. What is the BEST way for the information security manager to mitigate the
associated risk?
Answer: B
Which of the following would provide the MOST comprehensive view of the effectiveness of the information
security function within an organization?
C. A balanced scorecard
Answer: A
Which of the following is the BEST way to ensure the effectiveness of a role-based access scheme?
Answer: D
Question #:226 - (Exam Topic 6)
Which of the following should be an information security manager's FIRST course of action if notified by a
third party that the organization's client data is being sold online?
Answer: A
Which of the following should be done FIRST when implementing policies to address an upcoming new data
privacy regulation?
A. Understand which types of personal data are covered by the new regulation.
C. Segregate systems processing personal data from other systems on the network-
Answer: A
During the restoration of several servers, a critical process that services external customers was restored late
due to a failure, resulting in lost revenue. Which of the following would have BEST helped to prevent this
occurrence?
Answer: B
Question #:229 - (Exam Topic 6)
An organization's recent risk assessment has identified many areas of security risk, and senior management has
asked for a five-minute overview of The assessment results. Which of the following is the information security
manager's BEST option for presenting this information?
A. Risk register
B. Spider diagram
D. BalarKed scorecard
Answer: C
Which of the following is the MOST challenging aspect of securing Internet of Things (loT) devices?
A.
Answer: B
Answer: D
The effectiveness of security awareness programs in fostering positive security cultures is MOST dependent
upon employee:
Answer: D
Which of the following is the MOST effective way to ensure the process for granting access to new employees
is standardized and meets organizational security requirements?
A. Adopt a standard template of access levels for all employees to be enacted upon hiring.
C.
C. Require managers of new hires be responsible for account setup and access during employee orientation.
D. Grant authorization to individual systems as required with the approval of information security
management.
Answer: B
Which of the following metrics provides the BEST indication of the effectiveness of a security awareness
campaign?
Answer: B
Which of the following provides the BEST means of ensuring business units outside of IT have their
information security concerns addressed?
Answer: A
Question #:236 - (Exam Topic 6)
Which of the following will BEST enable an effective information asset classification process?
C. Assigning ownership
Answer: A
The frequency of conducting business impact analysis (BIA) should PRIMARILY be based on:
Answer: D
D. filtering of e-mail.
Answer: D
Which of the following metrics is the BEST indicator of an abuse of the change management process that
could compromise information security?
Answer: A
Which of the following is the MOST effective way to mitigate the risk of data loss in the event of a stolen
laptop?
Answer: C
The MOST important reason for an information security manager to be involved in a new software purchase
initiative is to:
Answer: A
An information security manager learns that a departmental system is out of compliance with the information
security policy's authentication requirements. Which of the following should be the information security
manager's FIRST course of action?
Answer: B
Which of the following is the MOST effective method to prevent a SQL injection in an employee portal?
Answer: A
In which of the following ways can an information security manager BEST ensure that security controls are
adequate for supporting business goals and objectives?
Answer: B
Which of the following is the FIRST step required to achieve effective performance measurement?
Answer: B
When implementing a new risk assessment methodology, which of the following is the MOST important
requirement?
Answer: C
Which of the following should be an information security managers FIRST course of action following a
decision to implement a new technology?
C. Determine whether the new technology will comply with regulatory requirements.
Answer: A
Which of the following is the MOST important reason for logging firewall activity?
A. Auditing purposes
B. Incident investigation
C. Firewall tuning
D. Intrusion detection
Answer: A
When facilitating the alignment of corporate governance and information security governance, which of the
following is the MOST important role of an organizations security steering committee?
A.
Answer: D
Answer: A
Answer: D
The use of a business case to obtain funding for an information security investment is MOST effective when
the business case:
C.
Answer: A
Which of the following is the MOST important reason to document information security incidents that are
reported across the organization?
Answer: C
What should the information security manager recommend to support the development of a new web
application that will allow retail customers to view inventory and order products?
Answer: B
Answer: D
Which of the following will BEST ensure that risk is evaluated on system level changes?
Answer: B
When trying to integrate information security across an organization, the MOST important goal for a
governing body should be to ensure:
B. the resources used for information security projects are kept to a minimum.
Answer: D
Which of the following BEST helps to identify vulnerabilities introduced by changes to an organization's
technical infrastructure?
D. Penetration testing
Answer: A
Question #:20 - (Exam Topic 7)
Management is questioning the need for several items in the information security budget proposal. Which of
the following would have been MOST helpful prior to budget submission?
Answer: C
Question #:21 - (Exam Topic 7)
Which of the following is the PRIMARY reason to avoid alerting certain users of an upcoming penetration
test?
Answer: D
Which of the following is the BEST approach for an information security manager to effectively manage
third-party risk?
Answer: B
The MOST effective way to communicate the level of impact of information security risks on organizational
objectives is to present:
B.
Answer: D
Answer: A
For an organization with a large and complex IT infrastructure, which of the following elements of a disaster
recovery hot site service will require the closest monitoring?
A. Number of subscribers
B. Audit tights
C. Systems configurations
D. Employee access
Answer: C
An organization recently rolled out a new procurement program that does not include any security
requirements. Which of the following should the information security manager do FIRST?
A. Escalate the procurement program gaps to the compliance department in case of noncompliance issues.
B. Ask internal audit to conduct an assessment of the current state of third-party security controls.
C. Conduct security assessments of vendors based on value of annual spend with each vendor.
D. Meet with the head of procurement to discuss aligning security with the organization's operational
objectives.
Answer: D
Senior management has decided to accept a significant risk within a security remediation plan. Which of the
following is the information security manager's BEST course of action?
Answer: C
An internal security audit has reported several control weaknesses. The information security manager's BEST
course of action should be to:
Answer: B
In a large organization, which of the following is the BEST source for identifying ownership of a PC?
D. User ID register
Answer: A
Which of the following is the BEST control to minimize the risk associated with loss of information as a result
of ransomware exploiting a zero-day vulnerability?
Answer: B
Which of the following is the MOST important consideration for designing an effective information security
governance framework?
Answer: B
Which of the following is the PRIMARY goal of an incident response team during a security incident?
Answer: B
A third-party service provider is developing a mobile app for an organization's customers. Which of the
following issues should be of GREATEST concern to the information security management.
Answer: A
Answer: B
Which of the following is the PRIMARY objective of reporting security metrics to stakeholders?
Answer: D
Question #:36 - (Exam Topic 7)
BEST way to isolate corporate data stored on employee-owned mobile devices would be to implement:
A. a sandbox environment
B.
B. device encryption,
C. two-factor authentication
Answer: A
Which of the following is the BEST reason to separate short-term from long-term plans within an information
security roadmap?
Answer: C
The BEST way to obtain funding from senior management for a security awareness program is to:
Answer: A
Ensuring that an organization can conduct security reviews within third-party facilities is PRIMARILY
enabled by:
A. contractual agreements.
C.
D. audit guidelines.
Answer: A
Which of the following is the BEST indication that an information security control is no longer relevant?
D. Following the control costs the business more than not following it.
Answer: D
Which of the following provides the BEST evidence that the information security program is aligned to the
business strategy?
B. The information security team is able to provide key performance indicators (KPIs) to senior
management.
D. The information security program manages risk within the business1* risk tolerance.
Answer: C
The PRIMARY focus of a training curriculum for members of an incident response team should be:
A. technology training.
C. security awareness
Answer: D
Which of the following stakeholders would provide the BEST guidance in aligning the information security
strategy with organizational goals?
A. Board of directors
Answer: D
When selecting risk response options to manage risk, an information security manager's MAIN focus should
be on reducing:
Answer: A
Answer: C
The MAIN purpose of documenting information security guidelines for use within a large, international
organization is to:
B. ensure that all business units have the same strategic security goals.
Answer: B
Answer: A
Which of the following is the MOST important outcome of testing incident response plans?
Answer: D
An organization has detected potential risk emerging from noncompliance with new regulations in its industry.
Which of the following is the MOST important reason to report this situation to senior management?
Answer: A
Which of the following is MOST important to consider when prioritizing threats during the risk assessment
process?
Answer: B
An inexperienced information security manager is relying on its internal audit department to design and
implement key security controls. Which of the following is the GREATEST risk?
A. Conflict of interest
Answer: A
Which of the following is the BEST method to ensure that data owners take responsibility for implementing
information security processes?
A.
Answer: A
Which of the following is the PRIMARY reason an information security strategy should be deployed across an
organization?
Answer: D
In a resource-restricted security program, which of the following approaches will provide the BEST use of the
limited resources?
A. Cross-training
B. Risk avoidance
C. Risk prioritization
D. Threat management
Answer: C
A PRIMARY advantage of involving business management in evaluating and managing information security
risks is that they:
B.
Answer: A
Which of the following BEST promotes stakeholder accountability in the management of information security
risks?
Answer: A
Which of the following is the BIST course of action for the information security manager when residual risk is
above the acceptable level of risk?
Answer: D
The head of a department affected by a recent security incident expressed concern about not being aware of
the actions taken to resolve the incident. Which of the following is the BEST way to address this issue?
Answer: D
Which of the following would be an information security manager's PRIMARY challenge when deploying a
bring your own device (BYOD) mobile program in an enterprise?
D. Configuration management
Answer: C
In addition to cost what is the BEST criteria for selecting countermeasures following a risk assessment?
A. Maintenance requirements
D. Effort of implementation
Answer: B
Which of the following is MOST important to building an effective information security program?
Answer: D
Which of the following is an indicator of improvement in the ability to identify security risks?
Answer: A
Which of the following is MOST helpful when justifying the funding required for a compensating control?
B. Risk analysis
C. Business case
D. Threat assessment
Answer: C
Which of the following BEST demonstrates alignment between information security governance and corporate
governance?
Answer: C
The MAIN consideration when designing an incident escalation plan should be ensuring that:
Answer: C
An executive's personal mobile device used for business purposes is reported lost. The information security
manager should respond based on:
B. incident classification.
Answer: D
Which of the following is the MOST important criterion for complete closure of a security incident?
Answer: C
When recommending a preventive control against cross-site scripting in web applications, an information
security manager is MOST likely to suggest:
Answer: B
Which of the following MOST effectively helps an organization to align information security governance with
corporate governance?
Answer: A
Answer: D
An information security manager is developing a new information security strategy. Which of the following
functions would serve as the BEST resource to review the strategy and provide guidance for business
alignment?
B. Internal audit
Answer: C
An organization with a strict need-to-know information access policy is about to launch a knowledge
management intranet. Which of the following is the MOST important activity to ensure compliance with
existing security policies?
B. Change organization policy to allow wider use of the new web site.
D. Ensure that access to the web site is limited to senior managers and the board.
Answer: A
To ensure IT equipment meets organizational security standards, the MOST efficient approach is to:
Answer: A
Which of the following defines the triggers within a business continuity plan (BCP)?
B. Gap analysis
Answer: D
Which of the following should be an information security manager's PRIMARY focus during the development
of a critical system storing highly confidential data?
Answer: A
When creating an incident response plan, the PRIMARY benefit of establishing a clear definition of a security
incident is that it helps to:
Answer: D
What should be the information security manager s MOST important consideration when planning a disaster
recovery test?
A. Organization-wide involvement
Answer: C
The PRIMARY purpose of a security information and event management (SIEM) system is to:
B. resolve incidents
Answer: D
Which of the following would BEST help an information security manager prioritize remediation activities to
meet regulatory requirements?
Answer: B
A. risk appetite.
Answer: C
When implementing security architecture, an information security manager MUST ensure that security
controls:
B. are transparent.
Answer: D
Which of the following metrics would be considered an accurate measure of an information security program's
performance?
A. The number of key risk indicators (KRIs) identified, monitored, and acted upon
D. A single numeric score derived from various measures assigned to the security program
Answer: A
Which of the following is MOST important when prioritizing an information security incident?
Answer: C
Which of the following techniques is MOST useful when an incident response team needs to respond to
external attacks on multiple corporate network devices?
Answer: B
Which of the following has the GREATEST impact on efforts to improve an organization's security posture?
Answer: D
An information security manager is evaluating the key risk indicators (KRls) for an organization s information
security program. Which of the following would be the information security manager s GREATEST concern?
Answer: C
Reviewing which of the following would provide the GREATEST Input to the asset classification process?
A.
B. Compliance requirements
D. Risk assessment
Answer: A
Which of the following is MOST helpful for protecting an enterprise from advanced persistent threats (APTs)?
B. Threat intelligence
Answer: C
When developing a protection strategy for outsourcing applications, the information se<urity manager MUST
ensure that:
A. the security requirements are included in the service level agreement (SLA).
C. the responsibility for security is transferred in the service level agreement (SLA).
Answer: A
Question #:90 - (Exam Topic 7)
To minimize security exposure introduced by changes to the IT environment, which of the following is MOST
important to implement as part of change management?
D.
Answer: D
Which of the following is the MOST effective way to mitigate the risk of confidential data leakage to
unauthorized stakeholders?
Answer: B
An organization is planning to open a new office in another country. Sensitive data will be routinely sent
between the two offices. What should be the information security manager s FIRST course of action?
B. Encrypt the data for transfer to the head office based on security manager approval
C. Update privacy policies to include the other country's laws and regulations.
Answer: C
When considering whether to adopt a new information security framework, an organization's information
security manager should FIRST:
Answer: B
When conducting a post-incident review, the GREATEST benefit of collecting mean time to resolution
(MTTR) data is the ability to:
Answer: A
Question #:95 - (Exam Topic 7)
An information security manager discovers that the organization's new information security policy is not being
followed across all departments. Which of the following should be of GREATEST concern to the information
security manager?
A. Business unit management has not emphasized the importance of the new policy.
Answer: A
Question #:96 - (Exam Topic 7)
Which of the following is MOST relevant for an information security manager to communicate to business
units?
A. Risk ownership
B. Vulnerability assessments
D. Threat assessments
Answer: C
An organization is about to purchase a rival organization. The PRIMARY reason for performing information
Answer: B
Which of the following is MOST likely to increase end user security awareness in an organization?
Answer: C
After undertaking a security assessment of a production system, the information security manager is MOST
likely to:
A. inform the system owner of any residual risks and propose measures to reduce them.
B. establish an overall security program that minimizes the residual risks of that production system
C. inform the IT manager of the residual risks and propose measures to reduce them.
D. inform the development team of any residual risks and together formulate risk reduction measures.
Answer: A
Which of the following is the MOST important influence to the continued success of an organization's
information security strategy?
A. Information systems
B. Security processes
C. Organizational culture
D. Policy development
Answer: C
Which of the following is the MOST important factor to ensure information security is meeting the
organization's objectives?
Answer: B
Which of the following BEST ensures timely and reliable access to services?
A. Nonrepudiation
C. Availability
D. Authenticity
Answer: B
What should be an information security manager's FIRST course of action when an organization is subject to a
new regulatory requirement?
Answer: B
Which of the following is the BEST strategy to implement an effective operational security posture?
A. Defense in depth
B. Threat management
C. Vulnerability management
Answer: D
Which of the following is the PRIMARY reason to conduct periodic business impact assessments?
Answer: A
Which of the following should be an information security manager's PRIMARY role when an organization
initiates a data classification process?
Answer: D
An organization has established information security policies, but the information security the MOST likely
reason for this situation?
A. The information security policies are not communicated across the organization.
Answer: B
An organization has determined that one of its web servers has been compromised. Which of the following
actions should be taken to preserve the evidence of the intrusion for forensic analysis and potential litigation?
Answer: D
An information security manager has been made aware that some employees are discussing confidential
corporate business on social media sites. Which of the following is the BEST response to this situation?
A. Block workplace access to social media sites and monitor employee usage.
Answer: D
Which of the following should an information security manager do FIRST after learning about a new
regulation that affects the organization?
Answer: C
The MOST important reason to maintain key risk indicators (KRIs) is that:
Answer: A
What should an information security manager do FIRST when a service provider that stores the organization's
confidential customer data experiences a breach in its data center?
Answer: A
After adopting an information security framework, an information security manager is working with senior
management to change the organization-wide perception that information security is solely the responsibility
of the information security department. To achieve this objective, what should be the information security
manager's FIRST initiative?
C. Develop an operational plan providing best practices for information security projects.
Answer: A
Executive leadership has decided to engage a consulting firm to develop and implement a comprehensive
security framework for the organization to allow senior management to remain focused on business priorities.
Which of the following poses the GREATEST challenge to the successful implementation of the new security
governance framework?
B. Information security staff has little or no experience with the practice of information security
governance.
C. Executive leadership views information security governance primarily as a concern of the information
security management team.
D. Information Security management does not fully accept the responsibility for information security
governance.
Answer: C
Question #:115 - (Exam Topic 7)
Inadvertent disclosure of internal business information on social media is BEST minimized by which of the
following?
Answer: B
Which of the following would BEST demonstrate the maturity level of an organization's security incident
response program?
Answer: D
Which of the following is the MOST reliable source of information about emerging information security
threats and vulnerabilities?
B. Industry bloggers
Answer: D
Which of the following is the BEST reason to develop comprehensive information security policies?
Answer: A
What is the PRIMARY purpose of communicating business impact to an incident response team?
Answer: D
Question #:120 - (Exam Topic 7)
Which of the following is MOST helpful for prioritizing the recovery of IT assets during a disaster?
A. Vulnerability assessment
D. Risk assessment
Answer: B
When integrating information security requirements into software development, which of the following
practices should be FIRST in the development lifecycle?
A. Penetration testing
D. Threat modeling
Answer: D
A security team is conducting its annual disaster recovery test. Post-restoration testing shows the system
response time is significantly slower due to insufficient bandwidth for Internet connectivity at the recovery
center. Which of the following is the security manager's BEST course of action?
B.
Answer: C
Which of the following would BEST protect against web-based cross-domain attacks?
B. Encryption controls
C. Application controls
D. Database hardening
Answer: C
Which of the following is MOST important for effective communication during incident response?
Answer: C
When aligning an organization's information security program with other risk and control activities, it is
MOST important to:
D.
Answer: D
Which of the following is the BEST way to prevent recurrence of a security incident?
A. An appropriate investigation into the root cause with corrective measures applied
C. An expanded and more effective monitoring and detection process for incidents
Answer: A
Vulnerability scanning has detected a critical risk in a vital business application. Which of the following
should the information security manager do FIRST?
Answer: B
An organization has an approved bring your own device (BYOD) program. Which of the following is the
MOST effective method to enforce application control on personal devices?
Answer: A
Which of the following is BEST to include in a business case when the return on investment (RIO) for an
information security initiative is difficult to calculate?
Answer: B
Which of the following would be MOST effective in preventing malware from being launched through an
email attachment?
Answer: B
Which of the following is MOST important when establishing a successful information security governance
framework?
Answer: A
Which of the following should be communicated FIRST to senior management once an information security
incident has been contained?
Answer: B
Which of the following presents the GREATEST information security concern when deploying an identity and
access management solution?
Answer: A
When granting a vendor remote access to a system, which of the following is the MOST important
consideration?
A. Password hashing
B. Session monitoring
Answer: B
When developing a new system, detailed information security functionality should FIRST be addressed:
B. as part of prototyping.
Answer: D
Which of the following devices, when placed in a demilitarized zone (DMZ). would be considered a
significant exposure?
A. Authentication server
B. Web server
C. Proxy server
Answer: A
Which of the following is MOST critical for an effective information security governance framework?
Answer: C
After a security incident has been contained, which of the following should be done FIRST?
Answer: B
Answer: A
Which of the following is the BEST way to address any gaps identified during an outsourced provider
selection and contract negotiation process?
Answer: A
Which of the following functions is MOST critical when initiating the removal of system access for terminated
employees?
A. Help desk
B.
B. Information security
C. Human resources
D. Legal
Answer: B
Which of the following should be the FIRST step of incident response procedures?
Answer: B
Which of the following would be the MOST effective incident response team structure for an organization
with a large headquarters and worldwide branch offices?
A. Coordinated
B. Decentralized
C. Outsourced
D. Centralized
Answer: D
Which of the following metrics would provide management with the MOST useful information about the
effectiveness of a security awareness program?
C.
Answer: C
Which of the following is the MOST important consideration to provide meaningful information security
reporting to senior management?
Answer: C
Which of the following is MOST helpful in determining the prioritization of available incident response
resources?
Answer: D
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS)
attack on a publicly facing …..
Answer: C
Which of the following is the MOST important security consideration when planning to use a cloud service
provider in a different country?
Answer: C
Which of the following factors is MOST likely to increase the chances of a successful social engineering
attack?
A. Technical skills
Answer: C
Which of the following approaches would MOST likely ensure that risk management is integrated into the
business life cycle processes?
Answer: B
The responsibility for approving access to data according to the organization's data classification policy
belongs to the:
A. data owner
B. system administrator.
Answer: A
What is the role of the information security manager in finalizing contract negotiations with service providers?
Answer: B
Which of the following is the BEST way to monitor for advanced persistent threats (APT) in an organization?
Answer: B
An organization is considering the purchase of a competitor. To determine the competitor's security posture,
the BEST course of action for the organization's information security manager would be to:
Answer: B
Which of the following is the MOST effective way to facilitate the implementation of IT security program
objectives?
Answer: B
When an organization lacks internal expertise to conduct highly technical forensics investigations, what is the
BEST way to ensure effective and timely investigations following an information security incident?
Answer: B
Which of the following is MOST important for an information security manager to present to senior
management on a regular basis?
A.
Answer: B
Which of the following is the BEST way to measure the effectiveness of a newly implemented social
engineering training program?
Answer: D
A global organization has developed a strategy to share a customer information database between offices in
two countries. In this situation, it is MOST important to ensure:
B. data sharing complies with local laws and regulations at both locations.
Answer: B
Which of the following is the PRIMARY purpose for defining key performance indicators (KPIs) for a
security program?
Answer: D
An organization has contracted with an outsourcing company to address a security gap. Which of the
following is the BEST way to determine if the security gap has been addressed?
A. Vulnerability scan
D. Security audit
Answer: D
Which of the following is the GREATEST security concern when an organization allows the use of social
networks?
Answer: D
Which of the following is the MAIN concern when securing emerging technologies?
B. Unknown vulnerabilities
D.
Answer: D
The PRIMARY responsibility to communicate with legal authorities regarding unauthorized disclosure of
customer information should be defined in the:
Answer: A
What information is MOST helpful in demonstrating to senior management how information security
governance aligns with business objectives?
Answer: A
Which of the following will BEST facilitate the development of appropriate incident response procedures?
Answer: D
An online payment provider's computer security incident response team has confirmed that a customer credit
card database was breached. Which of the following would be MOST important to include in a report to senior
management?
Answer: C
Question #:24 - (Exam Topic 8)
When creating a bring your own device (BYOD) program, it is MOST important to:
D. balance the costs between private versus business usage and define the method to track usage.
Answer: A
An internal control audit has revealed a control deficiency related to a legacy system where the compensating
controls no longer appear to be effective. Which of the following would BEST help the information security
manager determine the security requirements to resolve the control deficiency?
A. Risk assessment
B. Gap analysis
C. Cost-benefit analysis
D. Business case
Answer: B
While auditing a data center's IT architecture, an information security manager discovers that required
encryption for data communications has not been implemented. Which of the following should be done
NEXT?
Answer: A
Answer: D
Which of the following is the PRIMARY responsibility of an information security manager in an organization
that is implementing the use of company-owned mobile devices in its operations?
Answer: B
B.
Answer: D
An IT department is having difficulty controlling the installation and use of unauthorized software that is in
breach of organizational policy. Which of the following is the MOST effective solution?
Answer: A
An information security manager wants to implement a security Information and event management (SIEM)
system that will aggregate log data from all systems that control perimeter access. Which of the following
would BEST support the business case for this initiative to senior management?
Answer: D
When building a corporate-wide business continuity plan {BCP), it is discovered there are two separate lines
of business systems that could be impacted by the same threat. Which of the following is the BEST method to
determine the priority of system recovery in the event of a disaster?
B.
Answer: B
What is the BEST approach for the information security manager to reduce the impact on a security program
due to turnover within the security staff?
Answer: D
During which stage of the software development life cycle (SDLC) should application security controls FIRST
be addressed?
B. Configuration management
C. Requirements gathering
Answer: A
Answer: B
Answer: C
An organization has announced company-wide budget cuts due to poor financial performance, impacting
delivery of the information security program. What should the information security manager do FIRST?
B. Reduce the scope of existing security Initiatives to lower the total cost.
C. Reduce the number of Information security projects to adhere to the new budget.
D. Inform senior management of the increased risk associated with lack of funding.
Answer: A
Answer: A
Which of the following provides a sound basis for effective security change management?
A. Configuration management
B. Password management
C. Incident management
D. Version management
Answer: A
An information security manager recently received funding for a vulnerability scanning tool to replace manual
assessment techniques and needs to justify the expense of the tool going forward. Which of the following
metrics would BEST indicate the tool is effective?
Answer: C
An organization has announced new initiatives to establish a big data platform and develop mobile apps. What
is the FIRST step when defining new human resource requirements?
Answer: B
Which of the following presents the GREATEST concern to the information security manager when using
A. social engineering.
B. phishing.
D. denial of service.
Answer: D
Answer: D
An information security manager has discovered an external break-in to the corporate network Which of the
following actions should be taken FIRST?
Answer: D
Which of the following is MOST critical to the successful implementation of information security within an
organization?
A.
A. Strong risk management skills exist within the information security group.
B. The information security manager is responsible for setting information security policy.
Answer: D
Which of the following is the MOST appropriate board-level activity for information security governance?
Answer: D
Which of the following is the NEXT course of action for an incident response team if an Incident cannot be
investigated in the allocated time?
Answer: D
Which of the following recovery approaches generally has the LOWEST periodic cost?
A. Redundant site
B. Reciprocal agreement
D. Cold site
Answer: D
Senior management is concerned a security solution may not adequately protect its multiple global data centers
following recent industry breaches. What should be done NEXT?
Answer: D
Which of the following is MOST important when allowing employees to work at home using personally
owned devices?
Answer: B
Which of the following would provide the HIGHEST level of confidence in the integrity of data when sent
from one party to another?
Answer: A
Which of the following is MOST effective in preventing the introduction of vulnerabilities that may disrupt
the availability of a critical business application?
C. Version control
Answer: B
Which of the following will provide the MOST accurate test results for a disaster recovery plan (DRP)?
B. Structured walk-through
C. Parallel test
D. Simulation test
Answer: A
An information security manager wants to justify the Investment required to integrate information security into
business processes. What should be the FIRST course of action?
Answer: B
A core business unit relies on an effective legacy system that does not meet the current security standards and
threatens that enterprise network. Which of the following is the BEST course of action to address the
situation?
A. Require that new systems that can meet the standards be implemented.
Answer: C
Answer: A
Which of the following is MOST helpful in identifying external and internal factors that could influence the
organization's future information security posture?
A. SWOT analysis
B. Penetration testing
D. IT balanced scorecard
Answer: A
A multinational organization has developed a bring your own device (BYOD) policy that requires the
installation of mobile device management (MDM) software on personally owned devices. Which of the
following poses the GREATEST challenge for implementing the policy?
Answer: B
Which of the following poses the GREATEST risk to the operational effectiveness of an incident response
team?
Answer: C
An organization has decided to migrate a customer facing on-premise application to a cloud provider. Which
of the following would be MOST helpful when assessing the proposed data backup requirements prior to the
migration?
B. Control assessment
C. Risk assessment
Answer: D
A. replacement cost
B. threat level
C. business value
D. frequency of use.
Answer: C
Which of the following is the PRIMARY purpose of establishing an information security governance
framework?
Answer: A
Which of the following is the MOST effective approach to ensure IT processes are performed in compliance
with the information security policies?
Answer: D
The MOST effective way to determine the resources required by internal Incident response teams is to
B.
Answer: D
Which of the following would be MOST helpful to an information security manager tasked with enforcing
enhanced password standards?
Answer: A
Which of the following is MOST important for the alignment of an information security program with the
information security strategy?
Answer: A
Which is MOST important when aligning security priorities with business unit strategies?
B. Stakeholder feedback
C. Gap analysis
Answer: B
An internal security audit has reported that authentication controls are not operating effectively. Which of the
following is MOST important to c management?
A. The impact of the control weakness on the risk profile of the organization
Answer: A
Which of the following provides the MOST essential input for the development of an information security
strategy?
Answer: D
An information security manager is reviewing the organization's incident response policy affected by a
proposed public cloud integration. Which of the following will be the MOST difficult to resolve with the cloud
service provider?
Answer: A
Senior management is concerned several security incidents were not reported in a timely manner. Which of the
following should the information security manager do FIRST to address this situation?
Answer: B
Question #:72 - (Exam Topic 8)
An organization's security was compromised by outside attackers. The organization believed that the incident
was resolved. After a few days, the IT staff is still noticing unusual network traffic. Which of the following is
the BEST course of action to address this situation?
Answer: C
A new version of an information security regulation is published that requires an organization's compliance.
The information security manager should FIRST
Answer: D
B. Segregation of duties
Answer: B
Answer: B
Which of the following is MOST important when carrying out a forensic examination of a laptop to determine
an employee s involvement in a fraud?
Answer: A
An organization manages payroll and accounting systems for multiple client companies Which of the
following contract terms would indicate a potential weakness for a disaster recovery hot site?
A.
B. Work-area size Is limited but can be augmented with nearby office space
Answer: A
Which of the following would BEST enable an effective response to a network-based attack?
Answer: B
Which of the following activities would BEST incorporate security into the software development life cycle
{SOLO7
Answer: C
If the inherent risk of a business activity is higher than the acceptable risk level, the information security
manager should FIRST
Answer: C
The MOST important reason to use a centralized mechanism to identify information security incidents is to:
Answer: B
An organization has purchased a security Information and event management (SIEM) tool. Which of the
following is MOST important lo consider before implementation?
A. Controls to be monitored
B. Reporting capabilities
Answer: A
The MAIN reason for an information security manager to monitor industry level changes in the business and
IT is to:
D.
Answer: B
Answer: A
What would be an information security manager's BEST recommendation upon learning that an existing
contract with a third party does not clearly identify requirements for safeguarding the organization's critical
data?
Answer: D
Which of the following would be MOST important to include in a bring your own device (BYOD) policy with
regard to lost or stolen devices? The need for employees to:
Answer: B
What should be an information security manager's NEXT activity following the remediation of a security
incident?
Answer: C
An organization rolled out information security awareness training and wants to perform an end-ot-year
assessment to determine the program's success. Which of the following would be the BEST indicator of the
program's effectiveness?
Answer: C
Which of the following is the BEST reason for delaying the application of a critical security patch?
B. Resource limitations
D. Technology interdependences
Answer: D
An information security manager has developed a strategy to address new information security risks resulting
from recent change the business. Which of the following would be MOST important to include when
presenting the strategy to senior management?
Answer: B
Answer: D
From an Information security perspective, legal issues associated with a transborder flow of
technology-related items are MOST often related to
Answer: A
Question #:93 - (Exam Topic 8)
Utilizing external resources for highly technical information security tasks allows an information security
manager to:
A. outsource responsibility,
Answer: D
Question #:94 - (Exam Topic 8)
When preparing a risk treatment plan, which of the following is the MOST important consideration when
reviewing options for mitigating risk?
A. Cost-benefit analysis
B. User acceptance
C. Control identification
Answer: A
The MOST important reason to maintain metrics for incident response activities is to
Answer: A
Question #:96 - (Exam Topic 8)
Which of the following is MOST important for an information security manager to verify when selecting a
third-party forensics provider?
C.
Answer: C
Which of the following models provides a client organization with the MOST administrative control over a
cloud-hosted environment?
Answer: B
System logs and audit logs for sensitive systems should be stored
Answer: B
In order to understand an organization's security posture, it is MOST important for an organizations senior
leadership to:
Answer: B
A. Email filtering
C. Application whitelisting
D. Network encryption
Answer: A
An information security manager has identified and implemented mitigating controls according to industry
best practices. Which of the following is the GREATEST risk associated with this approach?
Answer: A
Which of the following is the MOST effective approach of delivering security incident response training?
A. Provide on-the-job training and mentoring for the incident response team.
Answer: A
Which of the following is the BEST method for management to obtain assurance of compliance with its
security policy?
Answer: B
Senior management is alarmed by recent media reports of severe security incidents at competing organizations
Which of the following would provide the BEST assurance that the organization's current security measures
are performing adequately?
Answer: B
In the development of an information security strategy, recovery time objectives (RTOs) will serve as
indicators of:
B. risk tolerances.
C. maturity levels.
D. open vulnerabilities.
Answer: B
An information security manager is reviewing the business case for a security project that is entering the
development phase It is determined that the estimates cost of the controls is now greater than the risk being
mitigated. What is the information security manager's BEST recommendation?
A. Slow the pace of the project to spread costs over a longer period.
Answer: C
Senior management has endorsed a comprehensive information security policy. Which of the following should
the organization do NEXT?
Answer: A
Answer: A
Which of the following provides the GREATEST assurance that information security is addressed in change
management?
Answer: C
Which of the following would be MOST helpful in gaming support for a business case for an Information
security initiative9
Answer: B
Answer: B
An organization has decided to store production data in a cloud environment. What should be the FIRST
consideration?
A. Data isolation
B. Data classification
C.
C. Data transfer
D. Data backup
Answer: B
When a critical incident cannot be contained in a timely manner and the affected system needs to be taken
offline, which of the following stakeholders MUST receive priority communication?
A. System end-users
B. System administrator
D. Senior management
Answer: C
An organization is considering moving to a cloud service provider for the storage of sensitive data. Which of
the following should be considered FIRST?
Answer: B
Communicating which of the following would be MOST helpful to gain senior management support for risk
treatment options?
A. industry benchmarks
B. Threat analysis
D.
D. Quantitative loss
Answer: C
For computer forensics evidence to be admissible in a court of law, the evidence MUST:
Answer: C
A data-hosting organization's data center houses servers, applications, and data for a large number of
geographically dispersed customers. Which of the following strategies is the BEST approach for developing a
physical access control policy for the organization?
Answer: B
Which aspect of an incident response plan will MOST effectively help to limit reputational damage when
multiple media services are seeking a response following a major security breach?
Answer: C
Which of the following would BEST enable integration of information security governance into corporate
governance?
C. Using a balanced scorecard to measure the performance of the information security strategy
Answer: C
Which of the following should be the PRIMARY input when defining the desired state of security within an
organization?
Answer: D
Question #:121 - (Exam Topic 8)
Which of the following has the MOST influence on an organization's adoption of information security
policies?
Answer: C
A business unit is preparing the business case for acquiring an e-commerce solution Which of Ihe following
should be provided by the information security manager?
Answer: B
When two different controls are available to mitigate a risk, an information security manager's
recommendation should be based on the results of a:
A. control evaluation
B. cost-benefit analysis
C. countermeasure analysis
D. threat analysis.
Answer: B
Which of the following provides the BEST indication that the information security program is in alignment
with enterprise requirements?
Answer: A
Which of the following is the MOST relevant risk factor to an organization when employees use social media?
B. Social media increases the velocity of risk and the threat capacity.
Answer: A
Which of the following should be of MOST influence to an information security manager when developing IT
security policies?
C. IT security framework
D. Business strategy
Answer: B
Which of the following is the PRIMARY responsibility of the information security manager when an
organization implements the use of personally-owned devices on the corporate network?
Answer: C
The authorization to transfer the handling of an internal security incident to a third-party support provider is
PRIMARILY defined by the:
B. escalation procedures
D. chain of custody.
Answer: B
A. international standards.
B. inherent risks.
C. business risks.
D. business demands.
Answer: C
Question #:130 - (Exam Topic 8)
Which of the following is MOST helpful in protecting against hacking attempts on the production network?
Answer: D
An organization has remediated a security flaw in a system Which of the following should be done NEXT?
Answer: D
What should an information security manager do FIRST when made aware of a new regulation which may
require the redesign of existing information security processes?
Answer: C
Which of the following security controls should be integrated FIRST into procurement processes to improve
the security of the services provided by suppliers'?
Answer: D
Question #:134 - (Exam Topic 8)
Which of the following is the MOST effective way for an organization to ensure its third-party service
providers are aware of information security requirements and expectations?
Answer: A
What is the BEST reason to keep information security policies separate from procedures?
A.
Answer: D
An incident was detected where customer records were altered without authorization. The GREATEST
concern for forensic analysis would be that the log data:
D. may be modified.
Answer: D
Which of the following is the BEST source of information to help determine whether a third party's
connections to the organization's internal network are aligned with internal control requirements?
C. Contractual requirements
Answer: C
In a multinational organization, local security regulations should be implemented over global security policy
because:
Answer: C
Which of the following BEST demonstrates the performance of the information security program to Key
stakeholders?
D. Security dashboard
Answer: D
Which of the following is the MOST important security consideration when using Infrastructure as a Service
(laaS)?
Answer: B
An organization is the victim of an attack generating multiple incident reports. Which of the following will
BEST enable incident handling and contain exposure?
D.
Answer: D
An organization plans to implement a document collaboration solution to allow employees to share company
information. Which of the following is the MOST important control to mitigate the risk associated with the
new solution?
Answer: C
Which of the following is the MOST important reason for performing a cost-benefit analysis when
implementing a security control?
A. To ensure that the mitigation effort does not exceed the asset value
Answer: A
Answer: B
An organization has detected sensitive data leakage caused by an employee of a third-party contractor. What is
the BEST course of action to address this issue?
Answer: A
Which of the following is the MOST important criterion when deciding whether to accept residual risk?
Answer: B
For an organization that provides web-based services, which of the following security events would MOST
likely initiate an incident response plan and be escalated to management?
Answer: D
An application system stores customer confidential data and encryption is not practical. The BEST measure to
protect against data disclosure is:
B. single sign-on.
Answer: D
In a large organization requesting outsourced services, which of the following contract clauses is MOST
important to the information security manager?
C. Nondisclosure clause
D. Intellectual property
Answer: A
Which of the following is MOST helpful to an information security manager when determining service level
requirements for an outsourced application?
A. Data classification
C. Business functionality
D. Application capabilities
Answer: C
Which of the following is MOST effective in reducing the financial impact following a security breach leading
to data disclosure9
Answer: B
Which of the following would MOST effectively help to restrict sensitive data from being transmitted outside
the organization?
B. Data forensics
Answer: C
Question #:153 - (Exam Topic 8)
An information security manager has been asked to integrate security into the software development life cycle
(SDLC) after requirements have already been gathered. In this situation during which phase would integration
be MOST effectrve?
B. Code review
C. Penetration testing
Answer: A
When reporting on the effectiveness of the information security program, which of the following is the BEST
way lo demonstrate improvement m security performance?
C. Provide a summary of security project return on investments (ROls) for the past year.
Answer: D
Question #:155 - (Exam Topic 8)
Answer: D
Which of the following should be done FIRST when establishing security measures for personal data stored
and processed on a human resources….system?
Answer: D
Threat and vulnerability assessments are important PRIMARILY because they are:
D.
Answer: C
Which of the following should be the PRIMARY goal of an Information security manager when designing
Information security policies?
Answer: D
Which of the following is the BEST way for an Information security manager to gain wider acceptance for an
information security policy that is perceived as restrictive?
Answer: D
Which of the following is the MOST significant security risk in IT asset management?
Answer: B
Which of the following is the BEST course of action for an information security manager to align security and
business goals?
Answer: C
Which of the following should be the FIRST step when creating an organization's bring your own device
(BYOD) program?
Answer: B
Which of the following is an important criterion for developing effective key risk indicators (KRIs) to monitor
information security risk?
A. The indicator should align with key performance indicators (KPIs) and measure root causes of process
performance issues.
B. The indicator should possess a high correlation with a specific risk and be measured on a regular basis
D. The indicator should provide a retrospective view of risk impacts and be measured annually.
Answer: A
An organization establishes an internal document collaboration site. To ensure data confidently of each project
group, it is MOST important to:
Answer: B
Which of the following trends BEST indicates that the maturity level of an information security program is
improving?
Answer: C
What should an information security manager do FIRST after a number of security gaps have been identified
that need to be resolved?
Answer: D
Due to recent cyber-attacks on industry peers, an organization has decided to create a separate Internal
network to reduce the risk of similar attacks. Which of the following should the Information security manager
do FIRST?
Answer: B
Which of the following is MOST important to the successful implementation of an information security
program?
Answer: C
Which of the following BEST supports the alignment of information security with business functions?
Answer: C
Which of the following should an information security manager do FIRST upon learning that a data loss
prevention (DLP) scanner has identified payment card information (PCI) stored in cleartext within accounting
file shares?
A.
Answer: A
A. Identifying vulnerabilities
B. Identifying assets
Answer: B
What should be the PRIMARY basis for defining the appropriate level of access control to information assets?
A. Business needs
B. Management requests
C. Audit findings
D. Compensating controls
Answer: A
Which of the following metrics is the MOST appropriate for measuring how well information security is
performing in dealing with outside attacks?
Answer: C
Which of the following would BEST demonstrate the status of an organization's information security program
to the board of directors?
Answer: C
Which of the following is MOST important to consider when determining the effectiveness of the Information
security governance program?
C. Maturity models
Answer: A
Which of the following metrics would BEST monitor how well information security requirements are
incorporated into the change management process?
Answer: C
A core business function has created a significant risk. Budget constraints do not allow for effective
remediation. Who should be accountable for selecting the appropriate risk treatment?
B. Security officer
C. Audit team
D. Senior management
Answer: A
Which of the following will MOST effectively minimize the chance of inadvertent disclosure of confidential
information?
Answer: C
Which of the following activities should be performed by someone other than the system administrator to
ensure a secure audit trail?
Answer: A
Which of the following is the BEST way to determine if an information security program aligns with corporate
governance?
Answer: B
Answer: D
Which of the following should be an information security manager's PRIMARY consideration when
developing an incident response plan?
Answer: D
An awareness program is implemented to mitigate the risk of infections introduced through the use of social
media Which of the following will BEST determine the effectiveness of the awareness program''
Answer: B
What should be the FIRST step when developing an asset management program?
Answer: D
Which of the following is MOST important in the development of metrics for the effectiveness of information
security?
Answer: A
Which of the following is the MOST reliable way to ensure network security incidents are Identified as soon
as possible'
Answer: D
Who within an organization is accountable for ensuring incident notification and escalation processes are in
place?
A. Data owner
B. Senior management
Answer: B
Which of the following BEST indicates the value a purchased information security solution brings to an
organization?
Answer: D
When outsourcing sensitive data to a cloud service provider, which of the following should be the information
security manager's MOST important.....
D.
D. Roles and responsibilities have been defined for the service provider.
Answer: B
Which of the following is MOST important lo track for determining the effectiveness of an information
security program?
Answer: B
Which of the following would be MOST useful in a report to senior management for evaluating changes in the
organization's information security risk position?
A. Trend analysis
B. Industry benchmarks
D. Risk register
Answer: A
Which of the following is MOST important for the effectiveness of an incident response function?
Answer: C
Which of the following service offerings in a typical Infrastructure as a Service (IaaS) model will BEST
enable a cloud service provider to assist customers when recovering from a security incident?
Answer: D
A newly appointed Information security manager finds mere is minimal interaction between departments in
identifying ...risk due to the organization's current decentralized structure What is the managers BEST course
of action?
B. identify appropriate risk management training for relevant staff in the departments
Answer: D
The BEST way to ensure information security efforts and initiatives continue to support corporate strategy is
by:
Answer: C
Which of the following is MOST likely to occur following a security awareness campaign''
Answer: D
Which of the following is the MOST important delivery outcome of information security governance?
A. Strategic alignment
B. Data classification
C. Vulnerability assessment
D. Asset protection
Answer: A
Several identified risks have been mitigated to an acceptable level with appropriate controls Which of the
following activities would BEST help to maintain acceptable risk levels?
Answer: B
Senior management has allocated funding to each of the organization s divisions to address information
security vulnerabilities The funding is based on each division's technology budget from the previous fiscal
year. Which of the following should be of GREATEST concern to the information security manager?
Answer: C
Question #:200 - (Exam Topic 8)
The MOST important objective of security awareness training for business staff is to:
A. modify behavior
D. increase compliance.
Answer: A
An organization is considering a self-service solution for the deployment of virtualized development servers.
Which of the following should be information security manager's PRIMARY concern?
Answer: A
An online trading company discovers that a network attack has penetrated the firewall What should be the
information security manager's FIRST response?
D.
Answer: B
Which of the following is the MOST effective way for an information security manager to protect the
organization from misuse of social media?
B. Hire a social media manager to control content delivered via social media.
Answer: D
Answer: D
Answer: A
Which of the following is the BEST indicator to demonstrate whether information security investments are
optimally supporting organizational objecti.....
Answer: C
Senior management wants to provide mobile devices to its sales force. Which of the following should the
Information security manager do FIRST to support this objective?
Answer: B
For an organization with operations in different parts of the world, the BEST approach for ensuring that
security policies do not conflict with local laws and regulations is to:
Answer: D
Which of the following is the PRIMARY reason to include message templates for communications with
external parties in an incident response plan?
Answer: B
Which of the following is the information security manager's PRIMARY role in the information assets
classification process?
Answer: C
An information security manager learns of a new international standard related to information security. Which
of the following would be the BEST course of action?
C. Determine whether the organization can benefit from adopting the new standard.
D. Perform a gap analysis between the new standard and existing practices.
Answer: D
The MAIN objective of identifying and evaluating risk at each software development life cycle (SDLC) stage
is to reduce the:
B. development time
D. mitigation costs.
Answer: D
Which of the following would provide the BEST justification for a new information security investment?
Answer: C
Which of the following is the MOST important reason for an organization to develop an information security
governance program?
C. Establishment of accountability
Answer: C
Which of the following is the MOST effective way to help ensure information security programs are aligned
with business objectives?
D. Establish and monitor information security performance metrics for the business.
Answer: B
Which of the following BEST demonstrates the effectiveness of the vulnerability management process?
Answer: A
Which of the following is the MOST effective way to incorporate risk management practices into a new
business process?
Answer: D
Which of the following is the BEST way to ensure that organizational security policies comply with data
security regulatory requirements?
Answer: D
A data leakage prevention (DLP) solution has identified that several employees are sending confidential
company data to their personal email addresses in violation of company policy. The information security
manager should FIRST.
Answer: C
Question #:220 - (Exam Topic 8)
Which of the following is the BEST way to integrate information security into corporate governance?
C. Ensure information security processes are part of the existing management processes.
Answer: C
An incident response team has determined there is a need to isolate a system that is communicating with a
known malicious host on the Internet, following stakeholders should be contacted FIRST?
B. Key customers
C. System administrator
D. Executive management
Answer: A
Information security awareness programs are MOST effective when they are:
Answer: A
Noncompliance issues were identified through audit. Which of the following is the BEST approach for the
information security manager to ensure that issues are resolved in a timely manner?
Answer: B
A risk assessment has been conducted following a data owner's decision to outsource an application to a cloud
provider Which of the following should be the information security manager's NEXT course of action?
Answer: D
A payroll application system accepts individual user sign-on IDs and then connects to its database using a
single application ID. The GREATEST weakness under this system architecture is that:
C. users can gam direct access to the application ID and circumvent data controls,
D. when multiple sessions with the same application ID collide, the database locks up
Answer: B
Question #:226 - (Exam Topic 8)
Which of the following BEST enables an information security manager to communicate the capability of
security program functions?
Answer: A
An organization wants to implement an emerging technology to support operations. What should the
information security manager do FIRST when .............. recommendation?
Answer: D
Which of the following is the GREATEST benefit of a centralized approach to coordinating information
security?
B.
Answer: B
During a post-incident review, the sequence and correlation of actions must be analyzed PRIMARILY based
on:
Answer: C
Which of the following is MOST important to present to stakeholders to help obtain support for implementing
a new information
Answer: C
The MOST important objective of monitoring key risk indicators (KRIs) related to information security is to:
D.
Answer: B
Which of the following is the BEST way for an information security manager to justify ongoing annual
maintenance fees associated with an intrusion prevention system (IPS)*?
C. Perform industry research annually and document the overall ranking of the IPS
Answer: B
Which of the following is the BEST method to obtain senior management buy-in for an information security
investment?
Answer: A
Which of the following is the MAIN objective of classifying a security incident as soon as it is discovered?
Answer: B
Which of the following is the BEST method to protect against data exposure when a mobile device is stolen?
A. Password protection
B. Insurance
C. Encryption
Answer: C
An information security manager wants to document requirements detailing the minimum security controls
required for user workstations. Which of the following resources would be MOST appropriate for this
purpose?
A. Procedures
B. Guidelines
C. Standards
D. Policies
Answer: D
Which of the following presents the MOST significant challenge when classifying IT assets?
Answer: D
Which is MOST important when contracting an external party to perform a penetration test?
Answer: D
Which of the following is the MOST important reason to consider the role of the IT service desk when
developing incident handling procedures?
A. The service desk provides a source for the identification of security incidents.
B. Service desk personnel have information on how to resolve common systems issues
C. The service desk provides information to prioritize systems recovery based on user demand
Answer: A
After a recent malware Incident an organization's IT steering committee has asked the information security
manager for a presentation on the status of the information security program. Which of the following is MOST
important to address in the presentation?
Answer: D
An organization is automating data protection by implementing a data loss prevention (DLP) solution. Which
of the following should the Information security manager do FIRST?
B.
Answer: C
Which of the following methods BEST ensures that a comprehensive approach is used to direct information
security activities?
Answer: A
For an organization that encourages sales activities using mobile devices, which of the following should be the
MOST important security requirement?
Answer: B
When making an outsourcing decision, which of the following functions is MOST important to retain within
the organization?
A. Security management
B. Incident response
C.
C. Risk assessment
D. Security governance
Answer: D
Answer: C
Which of the following is the GREATEST benefit of integrating information security program requirements
into vendor management?
Answer: A
Which of the following BEST enables new third-party suppliers to support an organization's information
security objectives?
Answer: D
Which of the following is MOST important to consider when developing a business continuity plan (BCP)?
Answer: D
Which of the following should provide the PRIMARY basis for formulating an information security strategy?
D. The IT strategy
Answer: C
A risk was identified during a risk assessment. The business process owner has chosen to accept the risk
because the cost of remediation is greater than the projected cost of a worst-case scenario. What should be the
information security manager's NEXT course of action?
Answer: A
Which of the following is an organization's BEST approach for media communications when experiencing a
disaster?
A. Hold a press conference and advise the media to refer to legal authorities.
C. Report high-level details of the losses and recovery strategy to the media.
Answer: D
An organization has identified an increased threat of external brute force attacks in its environment. Which of
the following is the MOST effective way to mitigate this risk to the organization's critical systems?
Answer: C
Which of the following is MOST useful to an information security manager when conducting a post-incident
review of an attack?
Answer: D
A.
Answer: C
Presenting which of the following to senior management will be MOST helpful in securing ongoing support
for the information security strategy?
Answer: C
Which of the following is the MOST important consideration m a bring your own device (BYOD) program to
protect company data in the event of a loss?
Answer: D
An organizations ability to prevent a security incident In a Software as a Service (SaaS) cloud-com puling
environment is MOST dependent on the:
Answer: D
Which of the following BEST supports information security management in the event of organizational
changes in security personnel?
Answer: D
Answer: C
Answer: B
An information security manager has determined that the mean time to prioritize information security
incidents has increased to an unacceptable level. Which of the following processes would BEST enable the
information security manager to address this concern?
A. Forensic analysis
B. Incident response
C. Incident classification
D. Vulnerability assessment
Answer: C
Following a highly sensitive data breach at a large company, all servers and workstations were patched. The
information security manager s NEXT step should be to:
Answer: B
Shortly after installation, an intrusion detection system (IDS) reports a violation. Which of the following is the
MOST likely explanation?
Answer: A
Which of the following is MOST effective in the strategic alignment of security initiatives?
Answer: C
Which of the following should be the MOST important consideration when implementing an information
security framework?
A. Compliance requirements
B. Audit findings
C. Risk appetite
D. Technical capabilities
Answer: A
Question #:266 - (Exam Topic 8)
An organization has decided to implement a security information and event management (SIEM) system. It is
MOST important for the organization to consider:
A. threat assessments.
B. data ownership.
D. log sources.
Answer: D
Which of the following should be the PRIMARY basis for a severity hierarchy for information security
incident classification?
C. Availability of resources
Answer: A
When is the BEST time to identify the potential regulatory risk a new service provider presents to the
organization?
Answer: B
Which of the following is the BEST way for an information security manager to protect against a zero-day
attack?
Answer: D
Which of the following is the MOST important security consideration when developing an incident response
strategy with a cloud provider?
A.
A. Technological capabilities
B. Escalation processes
Answer: D
The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning
process is to:
Answer: B
B. decentralize operations.
D. establish hierarchy.
Answer: A
Which of the following is the MOST appropriate party to approve an information security strategy?
Answer: D
Which of the following is MOST helpful to developing a comprehensive Information security strategy?
Answer: D
Question #:275 - (Exam Topic 8)
Which of the following is an information security manager's BEST course of action upon learning of new
cybersecurity regulatory requirements that apply to the organization?
Answer: D
Which of the following would be the BEST way for a company to reduce the risk of data loss resulting from
employee-owned devices accessing the corporate email system?
A. Link the bring-your-own-device (BYOD) policy to the existing staff disciplinary policy.
B. Require employees to undergo training before permitting access to the corporate email service
C. Require employees to install a reputable mobile anti-virus solution on their personal devices.
D. Use a mobile device management (MDM) solution to isolate the local corporate email storage.
Answer: D
Answer: B
The PRIMARY purpose of a periodic threat and risk assessment report to senior management is to
communicate the:
Answer: B
A significant gap in an organization's breach containment process has been identified. Which of the following
is MOST important for the information security manager to consider updating?
Answer: D
Which of the following should provide the PRIMARY justification to approve the implementation of a disaster
recovery (DR) site on the recommendation of an external audit report?
B. Regulatory requirements
C. Cost-benefit analysis
Answer: B
Which of the following should be the PRIMARY objective when developing an information security strategy?
Answer: A
Which of the following is the MOST important reason to have documented security procedures and
guidelines?
Answer: D
An information security manager has been made aware that implementing a control would have an adverse
impact to the business. The business manager has suggested accepting the risk. The BEST course of action by
the information security manager would be to:
B.
Answer: C
An organization is considering moving lo a cloud service provider for the storage of sensitive data Which of
the following .... consideration FIRST?
Answer: D
A new key business application has gone to production. What is the Most important reason to classify and
determine the sensitivity of the data used by this application?
Answer: C
Which of the following would BEST ensure that security risk assessment is integrated into the life cycle of
major IT projects?
A. Having the Information security manager participate on the project steering committees
Answer: B
An organization plans to acquire and implement a new web-based solution to enhance service functionality.
Which of the following is the BEST way to ensure that information handled by the solution is secure?
Answer: D
• A bad actor broke into a business-critical FTP server by brute forcing an administrative password
• The third-party service provider hosting the server sent an automated alert message to the help desk, but was
ignored
• The bad actor could not access the administrator console, but was exposed to encrypted data transferred to
the server
• After three (3) hours, the bad actor deleted the FTP directory causing incoming FTP attempts by legitimate
customers to fail
Which of the following poses the GREATEST risk to the organization related to This event?
D. Removal of data
Answer: A
What is the MOST effective way to ensure information security incidents will be managed effectively and in a
timely manner?
Answer: B
Which of the following is necessary to determine what would constitute a disaster for an organization?
D. Risk analysis
Answer: D
Which of the following is MOST important to help ensure an intrusion prevention system (IPS) can view all
traffic in a demilitarized zone (DMZ)?
Answer: D
The MOST important reason to have a well-documented and tested incident response plan in place is to:
A.
Answer: B
Which of the following defines the MOST comprehensive set of security requirements for a newly developed
information system?
A. Baseline controls
C. Audit findings
Answer: B
B. a reverse lookup.
C. a secure protocol.
D. a firewall
Answer: C
An organization wants to enable digital forensics for a business-critical application. Which of the following
will BEST help to support this objective?
Answer: A
A business previously accepted the risk associated with a zero-day vulnerability The same vulnerability was
recently exploited in a high-profile attack on another organization m the same Industry Which of the following
should be the information security manager's FIRST course of action?
Answer: A
Which of the following is the GREATEST risk associated with the installation of an intrusion prevention
system (IPS)?
Answer: B
What should an information security manager do FIRST upon learning that the third-party provider
responsible for a mission-critical process is subcontracting critical functions to other providers?
Answer: D
Following a significant change to the underlying code of an application, it is MOST important for the
information security manager to:
Answer: D
A validated patch to address a new vulnerability that may affect a mission-critical server has been released.
What should be done immediately?
Answer: A
Which of the following is the MOST important consideration when deciding whether to continue outsourcing
to a managed security service provider?
Answer: B
Answer: A
Which of the following should be the MOST important consideration when reporting sensitive risk-related
information to stakeholders?
Answer: A
Answer: A
An attacker was able to gain access to an organizations perimeter firewall and made changes to allow wider
external access and to steal data. Which of the following would have BEST provided timely identification of
this incident?
Answer: D
What is the MOST important role of an organization's data custodian in support of the information security
function?
Answer: B
Which of the following should be done FIRST when considering a new security initiative?
Answer: C
Answer: A
Management has expressed concerns to the information security manager that shadow IT may be a risk to the
organization. What is the FIRST step the information security manager should take?
Answer: A
Which of the following should an information security manager do FIRST when a recent internal audit reveals
a security risk is more severe than previously assessed?
A. Escalate the finding to the business owner and obtain a remediation plan.
Answer: A
Which of the following provides the BEST indication of strategic alignment between an organization's
information security program and business objectives?
B. A balanced scorecard
Answer: B
When establishing an information security strategy, which of the following activities Is MOST helpful in
Identifying critical areas to be protected?
Answer: C
Which of the following should be an information security manager s MOST important consideration when
conducting a physical security review of a potential outsourced data center?
Answer: A
The BEST way to report to the board on the effectiveness of the Information security program is to present:
D.
Answer: A
Which of the following provides the GREATEST assurance that existing controls meet compliance
requirements?
B. Evaluating metrics
D. Reviewing policies
Answer: B
The effectiveness of an information security governance framework will BEST be enhanced if:
Answer: A
When training an incident response team, the advantage of using tabletop exercises is that they:
Answer: B
Answer: B
What is the BEST way to determine the level of risk associated with information assets processed by an IT
application?
B. Review the cost of acquiring the information assets for the business.
Answer: C
Which of the following is MOST important to include in contracts with key third-party providers?
A. Right-to-audit clauses
C. Right-to-terminate clauses
Answer: A
Which of the following BEST demonstrates that the objectives of an information security governance
framework are being met?
B. Balanced scorecard
C. Risk dashboard
Answer: D
When monitoring the security of a web-based application, which of the following is MOST frequently
reviewed?
A. Access logs
B. Threat metrics
C. Audit reports
D. Access lists
Answer: A
Conflicting objectives are MOST likely to compromise the effectiveness of the information security process
when information security management is:
Answer: B
Which of the following is the BEST indication that an organization is able to comply with information security
requirements?
A.
Answer: D
During the establishment of a service level agreement (SLA) with a cloud service provider, it is MOST
important for the information security manager to:
Answer: B
Which of the following factors are the MAIN reasons why large networks are vulnerable?
Answer: A
Which of the following should be of MOST concern to an information security manager reviewing an
organization's data classification program*?
C.
Answer: D
an organizational objective
information assets
Answer: C
What is the BEST course of action when an Information security manager finds an external service provider
has not implemented adequate controls for safeguarding the organization's critical data?
Answer: B
Which of the following should be the GREATEST concern when considering launching a counterattack in
response to a network attack?
A.
D. Legal ramifications
Answer: D
Answer: B
The GREATEST advantage of defining multiple types of system administrator accounts with different
privileges is that it helps to ensure:
Answer: B
Which of the following will BEST ensure that possible security incidents are correctly distinguished from
typical help desk requests?
C.
Answer: B
The chief information security officer (ClSO) has developed an information security strategy, but is struggling
to obtain senior management commitment for funds to implement the strategy Which of the following is the
MOST likely reason?
Answer: C
The Information security manager and senior management of a global financial institution have been notified
of a potential breach to its database containing a large volume of sensitive information Which of the following
should be done FIRST?
Answer: A
Which of the following is the GREATEST benefit of integrating a security information and event management
(SIEM) solution with traditional security tools such as IDS, anti-malware. and email screening solutions?
Answer: C
Which of the following is the MOST important consideration when updating procedures for managing security
devices?
Answer: A
A. Continuous monitoring
B. Two-factor authentication
C. Layered protection
D. Penetration testing
Answer: C
A regulatory organization sends an email to an information security manager warning of an Impending cyber
attack. What should the information security manager do FIRST?
Answer: B
An outsourced vendor handles an organization's business-critical data. Which of the following is the MOST
effective way for the client organization to obtain assurance of the vendor's security practices?
Answer: B
A risk has been formally accepted and documented. Which of the following is the MOST important action for
an information security manager?
Answer: C
Which of the following is the MOST likely outcome from the implementation of a security governance
framework?
Answer: D
Answer: A
When considering whether to adopt bring your own device (BYOD). it is MOST important for the information
security manager to ensure that
A. security controls are applied to each device when joining the network.
Answer: A
Which of the following is the STRONGEST indication that senior management commitment to information
security is lacking within an organization?
Answer: A
Question #:346 - (Exam Topic 8)
An information security manager is concerned about the risk of fire at its data processing center To address
this concern, an automatic fire suppression system has been installed Which of the following risk treatments
has been applied?
A.
A. Acceptance
B. Transfer
C. Mitigation
D. Avoidance
Answer: C
Which of the following is MOST important to consider when developing a business case to support the
investment In an information security program?
Answer: A
Which of the following is the MOST important reason to identify and classify the sensitivity of assets?
Answer: C
Which of the following is MOST helpful for aligning security operations with the IT governance framework?
Answer: B
An organization has outsourced many application development activities to a third party that uses contract
programmers extensively. Which of the following would provide the BEST assurance that the third party's
contract programmers comply with the organization's security policies?
Answer: A
Who should be responsible for determining the classification of data within a database used in conjunction
with an enterprise application?
A. Data owner
C. Database architect
D. Database administrator
Answer: A
Which of the following is the MOST effective way for an Information security manager to ensure that security
is incorporated into an organization's project development processes?
D.
Answer: C
Which of the following should be the PRIMARY basis for determining risk appetite?
B. Organizational objectives
C. Industry benchmarks
Answer: D
What should be an information security manager's BEST course of action if funding for a security-related
initiative is denied by a steering committee?
Answer: D
Which of the following would provide the BEST evidence to senior management that security control
performance has improved?
Answer: C
Which of the following is the BEST way to ensure that Incidents are Identified and reported?
Answer: C
In a large organization, defining recovery time objectives (RTOs) is PRIMARILY the responsibility of;
B. the IT manager
C. senior management
Answer: D
Which of the following would provide the BEST input to a business case for a technical solution to address
potential system vulnerabilities?
C. Risk assessment
Answer: B
When developing an information security strategy, the MOST important requirement is that:
Answer: D
Which of the following is MOST important to consider when defining control objectives?
Answer: A
Which of the following is the BEST evidence of an effectively designed key risk indicator (KRI)?
Answer: B
Which of the following is the BEST way to reduce the risk of a ransomware attack?
C.
Answer: C
Which of the following should cause the GREATEST concern for an information security manager reviewing
the effectiveness of an intrusion prevention system (IDS)?
Answer: B
A. System modification
B. Program development
C. Unit testing
D. Stress testing
Answer: A
An information security manager has researched several options for handling ongoing security concerns and
will be presenting these solutions to business managers. Which of the following with BEST enable business
managers to make an informed decision?
B. Cost-benefit analysis
C. Risk analysis
D. Gap analysis
Answer: A
A. Countermeasures
B. Asset values
C. Threats
D. vulnerabilities
Answer: C
Which of the following is the BEST option for addressing regulations that will adversely affect the allocation
of information security program resources?
Answer: C
Which of the following is the PRIMARY benefit of implementing a maturity model for information security
management?
Answer: C
Which of the following is the MOST effective mitigation strategy to protect confident information from inside
threats?
Answer: B
While conducting a test of a business continuity plan (BCP). which of the following is the MOST important
consideration?
Answer: B
Which of the following is the FIRST step when defining and prioritizing security controls to be implemented
under an information security program?
A. Review the applicable regulations tn place and their impact to each business function
B. Understand the company's risk appetite and its alignment with the information security strategy
C. Interview function owners across the company to determine the best plan of action.
D. Review recent information security incidents to determine organizational focus areas and priorities
Answer: A
Answer: B
Which of the following would MOST likely require a business continuity plan to be invoked?
Answer: C
Which of the following is MOST critical when creating an incident response plan?
Answer: B
An information security manager finds that corporate information has been stored on a public cloud storage
site for business collaboration purposes. Which of the following should be the manager's FIRST action?
B.
Answer: D
Answer: C
Which of the following is the MOST effective method of preventing deliberate internal security breaches?
Answer: C
Answer: A
The BEST way for an information security manager to understand the critically of an online application is to
perform a
A. threat assessment
D. vulnerability assessment
Answer: C
Risk identification, analysis, and mitigation activities can BCST be integrated into business life cycle
processes by linking them to:
A. continuity planning
B. compliance testing
C. configuration management.
D. change management
Answer: D
During a review to approve a penetration test plan, which of the following should be an information security
Answer: D
Which of the following provides the BEST evidence that a control is being applied effectively?
Answer: B
When developing an incident response plan, the information security manager should:
C. include response scenarios that have been approved previously by business management.
Answer: C
A. cost-effective decisions are made with regard to which assets need protection
Answer: A
An organization has remediated a security flaw in a system. Which of the following should be done NEXT?
Answer: A
Question #:386 - (Exam Topic 8)
An organization recently implemented a data loss prevention (DLP) system. A senior business executive has
complained that the system seriously impedes departmental effectiveness. What is the information security
manager's BEST course of action?
Answer: B
An organization plans to process marketing data using a Software as a Service (SaaS) application via the
Internet To mitigate the associated risk, what is the information security manager's MOST important course of
action?
Answer: C
The PRIMARY objective of periodically testing an incident response plan should be to:
C.
Answer: D
An organization is developing a disaster recovery plan (DRP) for a data center that hosts multiple applications
The application recovery sequence would BEST be determined through an analysis of:
Answer: B
What should an Information security manager do FIRST to ensure an organization's security policies remain
relevant for a cloud adoption?
Answer: A
An organization is planning to create a website that will collect site-visitor details from around the world and
use them as marketing lists for operations in several countries. Which of the following should be of MOST
concern to the information security manager?
B. Privacy laws in each of the countries using the details for marketing
D.
D. Wording of the website's policy statement on how the details will be used
Answer: B
Which of the following is the BEST indicator that an organization is appropriately managing risk?
A. The number of events reported from the intrusion detection system (IDS) has declined.
Answer: B
An information security manager has been tasked with implementing a security awareness training program
Which of this ..... have the MOST influence on the effectiveness of this program?
Answer: C
Answer: A
To meet operational business needs. IT staff bypassed the change process and applied an unauthorized update
to a critical business system Which of the following is the information security manager's BEST course of
action?
Answer: A
Which of the following is MOST relevant for an information security manager to communicate to IT
operations?
A. Vulnerability assessments
D. Threat assessments
Answer: A
Which of the following messages would be MOST effective in obtaining senior management's commitment to
information security management?
Answer: C
When developing an escalation process for an incident response plan, the information security manager should
PRIMARILY consider the:
A. affected stakeholders
B. media coverage
Answer: A
Which activity is MOST important when identifying the appropriate security controls for a new business
application?
Answer: B
To integrate security into system development fie cycle (SDLC) processes, an organization MUST ensure that
security.
Answer: B
When a security weakness is detected at facilities provided by an IT service provider, which of the following
Answer: D
Answer: C
Which of the following is MOST important for an information security manager to ensure when evaluating
change requests?
Answer: A
Which of the following is the BEST way to define responsibility for information security throughout an
organization?
A. Policies
B.
B. Standards
C. Guidelines
D. Training
Answer: A
A corporate web site has become compromised as a result of a malicious attack. Which of the following
should the information security manager do FIRST?
Answer: A
Which of the following will BEST enable the identification of appropriate controls to prevent repeated
occurrences of similar types of information………..
Answer: B
Answer: C
The PRIMARY reason for defining the information security roles and responsibilities of staff throughout an
organization is to:
Answer: D
We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially
Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.
We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed
below.
Sales: sales@dumpscollection.com
Feedback: feedback@dumpscollection.com
Support: support@dumpscollection.com
Skype ID: crack4sure@gmail.com
Any problems about IT certification or our products, You can write us back and we will get back to you within 24
hours.