Skip to main content Scroll Top
Please select Menu Source

1. When performing a business impact analysis (BIA), who should be responsible for determining the initial recovery time objective (RTO)?

 
 
 
 

2. Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?

 
 
 
 

3. To improve the efficiency of the development of a new software application, security requirements should be defined:

 
 
 
 

4. Which of the following is the MOST likely reason for a vulnerability scanner to return incomplete results?

 
 
 
 

5. An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?

 
 
 
 

6. Which of the following is the MOST important consideration when updating procedures for managing security devices?

 
 
 
 

7. Which of the following is the PRIMARY benefit of training service desk staff to recognize incidents?

 
 
 
 

8. Which of the following is the PRIMARY benefit of an information security awareness training program?

 
 
 
 

9. Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?

 
 
 
 

10. Which of the following BEST enables an organization to maintain an appropriate security control environment?

 
 
 
 

11. A post-incident review identified that user error resulted in a major breach. Which of the following is MOST important to determine during the review?

 
 
 
 

12. An organization wants to migrate a proprietary application to be hosted by a third-party cloud hosting provider using a Platform as a Service (PaaS) model. Prior to selecting the cloud provider, what is MOST important for the organization to ensure?

 
 
 
 

13. A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager’s BEST course of action?

 
 
 
 

14. Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?

 
 
 
 

15. Management decisions concerning information security investments will be MOST effective when they are based on:

 
 
 
 

16. A startup company deployed several new applications with vulnerabilities into production because security reviews were not conducted. What will BEST help to ensure effective application risk management going forward?

 
 
 
 

17. Which of the following BEST helps to ensure a risk response plan will be developed and executed in a timely manner?

 
 
 
 

18. Which of the following is the BEST method for determining whether a firewall has been configured to provide a comprehensive perimeter defense9

 
 
 
 

19. Which of the following is MOST relevant for an information security manager to communicate to the board of directors?

 
 
 
 

20. An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?

 
 
 
 

21. Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?

 
 
 
 

22. An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?

 
 
 
 

23. Which of the following is a PRIMARY function of an incident response team?

 
 
 
 

24. Which of the following is the PRIMARY reason for an information security manager to periodically review existing controls?

 
 
 
 

25. Which of the following has the MOST influence on the inherent risk of an information asset?

 
 
 
 

26. An organization is implementing an information security governance framework. To communicate the program’s effectiveness to stakeholders, it is MOST important to establish:

 
 
 
 

27. Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?

 
 
 
 

28. Which of the following is the MOST effective defense against malicious insiders compromising confidential information?

 
 
 
 

29. When establishing classifications of security incidents for the development of an incident response plan, which of the following provides the MOST valuable input?

 
 
 
 

30. Which of the following metrics would provide an accurate measure of an information security program’s performance?

 
 
 
 

31. The MOST effective tools for responding to new and advanced attacks are those that detect attacks based on:

 
 
 
 

32. An organization’s marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:

 
 
 
 

33. An information security manager has been made aware of a new data protection regulation that will soon go into effect. Which of the following is the BEST way to manage the risk of noncompliance?

 
 
 
 

34. Which of the following is the PRIMARY purpose of an acceptable use policy?

 
 
 
 

35. The PRIMARY reason to properly classify information assets is to determine:

 
 
 
 

36. Which of the following presents the GREATEST challenge to a security operations center’s wna GY of potential security breaches?

 
 
 
 

37. During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:

 
 
 
 

38. Which of the following is PRIMARILY determined by asset classification?

 
 
 
 

39. The PRIMARY objective of performing a post-incident review is to:

 
 
 
 

40. Once a suite of security controls has been successfully implemented for an organization’s business units, it is MOST important for the information security manager to:

 
 
 
 

41. Which of the following is the MOST effective way to increase security awareness in an organization?

 
 
 
 

42. Which of the following is the MOST important reason to ensure information security is aligned with the organization’s strategy?

 
 
 
 

43. Which of the following components of an information security risk assessment is MOST valuable to senior management?

 
 
 
 

44. During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?

 
 
 
 

45. Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?

 
 
 
 

46. Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?

 
 
 
 

47. A department has reported that a security control is no longer effective. Which of the following is the information security manager’s BEST course of action?

 
 
 
 

48. Which type of backup BEST enables an organization to recover data after a ransomware attack?

 
 
 
 

49. Which of the following BEST minimizes information security risk in deploying applications to the production environment?

 
 
 
 

50. Which of the following should include contact information for representatives of equipment and software vendors?

 
 
 
 

51. Which of the following should be done FIRST to prioritize response to incidents?

 
 
 
 

52. Which of the following is the MOST important consideration when defining control objectives?

 
 
 
 

53. Recovery time objectives (RTOs) are an output of which of the following?

 
 
 
 

54. Which of the following is a PRIMARY benefit of managed security solutions?

 
 
 
 

55. A business impact analysis (BIA) BEST enables an organization to establish:

 
 
 
 

56. The BEST way to report to the board on the effectiveness of the information security program is to present:

 
 
 
 

57. Which of the following is MOST important to maintain integration among the incident response plan, business continuity plan (BCP). and disaster recovery plan (DRP)?

 
 
 
 

58. Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?

 
 
 
 

59. Which of the following is the GREATEST benefit of performing a tabletop exercise of the business continuity plan (BCP)?

 
 
 
 

60. Which of the following should be updated FIRST to account for new regulatory requirements that impact current information security controls?

 
 
 
 

61. The PRIMARY purpose of conducting a business impact analysis (BIA) is to determine the:

 
 
 
 

62. Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise’s security management framework?

 
 
 
 

63. Which of the following is MOST important to include in an information security policy?

 
 
 
 

64. Which of the following provides an information security manager with the MOST accurate indication of the organization’s ability to respond to a cyber attack?

 
 
 
 

65. Which of the following is the PRIMARY objective of a cyber resilience strategy?

 
 
 
 

66. An employee clicked on a link in a phishing email, triggering a ransomware attack Which of the following should be the information security?

 
 
 
 

67. An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager’s FIRST step?

 
 
 
 

68. Which of the following should be the PRIMARY focus of a lessons learned exercise following a successful response to a cybersecurity incident?

 
 
 
 

69. Which of the following is the PRIMARY objective of information asset classification?

 
 
 
 

70. An employee who is a remote user has copied financial data from the corporate server to a laptop using virtual private network (VPN) connectivity. Which of the following is the MOST important factor to determine if it should be classified as a data leakage incident?

 
 
 
 

71. Which of the following BEST ensures timely and reliable access to services?

 
 
 
 

72. Which of the following will have the GREATEST influence on the successful adoption of an information security governance program?

 
 
 
 

73. An organization is performing due diligence when selecting a third party. Which of the following is MOST helpful to reduce the risk of unauthorized sharing of information during this process?

 
 
 
 

74. Which of the following is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?

 
 
 
 

75. Which of the following is the BEST justification for making a revision to a password policy?

 
 
 
 

76. An organization that conducts business globally is planning to utilize a third-party service provider to process payroll information. Which of the following issues poses the GREATEST risk to the organization?

 
 
 
 

77. Which of the following should be the MOST important consideration when reviewing an information security strategy?

 
 
 
 

78. Determining the risk for a particular threat/vulnerability pair before controls are applied can be expressed as:

 
 
 
 

79. For which of the following is it MOST important that system administrators be restricted to read-only access?

 
 
 
 

80. Which of the following BEST helps to ensure a third-party backup site continues to meet the organization’s information security standards?

 
 
 
 

81. Which of the following roles has the PRIMARY responsibility to ensure the operating effectiveness of IT controls?

 
 
 
 

82. Which of the following provides the BEST input to determine the level of protection needed for an IT system?

 
 
 
 

83. Which of the following is ESSENTIAL to ensuring effective incident response?

 
 
 
 

84. Which of the following is the BEST way for an organization to ensure that incident response teams are properly prepared?

 
 
 
 

85. Which of the following is the MOST important consideration when developing key performance indicators (KPIs) for the information security program?

 
 
 
 

86. Which of the following is MOST important to include in security incident escalation procedures?

 
 
 
 

87. An information security team has started work to mitigate findings from a recent penetration test. Which of the following presents the GREATEST risk to the organization?

 
 
 

88. Which of the following is MOST important to the effectiveness of an information security steering committee?

 
 
 
 

89. Which of the following is the BEST way to prevent insider threats?

 
 
 
 

90. Which of the following is the BEST reason to implement an information security architecture?

 
 
 
 

91. An organization plans to implement a new e-commerce operation in a highly regulated market. Which of the following is MOST important to consider when updating the risk management strategy?

 
 
 
 

92. Which of the following is the PRIMARY benefit of implementing an information security governance framework?

 
 
 
 

93. Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?

 
 
 
 

94. An organization’s disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?

 
 
 
 

95. Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?

 
 
 
 

96. Who is BEST suited to determine how the information in a database should be classified?

 
 
 
 

97. Which of the following BEST facilitates effective strategic alignment of security initiatives?

 
 
 
 

98. Which of the following change management procedures is MOST likely to cause concern to the information security manager?

 
 
 
 

99. When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:

 
 
 
 

100. Which of the following should be updated FIRST when aligning the incident response plan with the corporate strategy?

 
 
 
 

101. Reverse lookups can be used to prevent successful:

 
 
 
 

102. Which type of policy BEST helps to ensure that all employees, contractors, and third-party users receive formal communication regarding an organization’s security program?

 
 
 
 

103. While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?

 
 
 
 

104. Management has announced the acquisition of a new company. The information security manager of the parent company is concerned that conflicting access rights may cause critical information to be exposed during the integration of the two companies. To BEST address this concern, the information security manager should:

 
 
 
 

105. Which of the following should be an information security manager’s FIRST course of action when one of the organization’s critical third-party providers experiences a data breach?

 
 
 
 

106. Which of the following is the MOST important issue in a penetration test?

 
 
 
 

107. The PRIMARY objective of timely declaration of a disaster is to:

 
 
 
 

108. An organization’s information security manager is performing a post-incident review of a security incident in which the following events occurred:
* A bad actor broke into a business-critical FTP server by brute forcing an administrative password
* The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
* The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
* After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail Which of the following could have been prevented by conducting regular incident response testing?

 
 
 
 

109. Which of the following MUST be established to maintain an effective information security governance framework?