Scroll Top
Please select Menu Source
 1%

Question 1 of 150

1. A project team member notifies the information security manager of a potential security risk that has not been included in the risk register. Which of the following should the information security manager do FIRST?
A.
B.
C.
D.

Question 1 of 150

Question 2 of 150

2. Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
A.
B.
C.
D.

Question 2 of 150

Question 3 of 150

3. Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
A.
B.
C.
D.

Question 3 of 150

Question 4 of 150

4. When properly implemented, secure transmission protocols protect transactions:
A.
B.
C.
D.

Question 4 of 150

Question 5 of 150

5. Which of the following is the BEST course of action after management has reviewed an identified risk and determines the risk is below the defined risk appetite?
A.
B.
C.
D.

Question 5 of 150

Question 6 of 150

6. Which of the following should be an information security manager's PRIMARY concern when an organization is expanding business to a new country?
A.
B.
C.
D.

Question 6 of 150

Question 7 of 150

7. A recent application security assessment identified a number of low- and medium-level vulnerabilities. Which of the following stakeholders is responsible for deciding the appropriate risk treatment option?
A.
B.
C.
D.

Question 7 of 150

Question 8 of 150

8. Which of the following is the PRIMARY benefit of training service desk staff to recognize incidents?
A.
B.
C.
D.

Question 8 of 150

Question 9 of 150

9. For the information security manager, integrating the various assurance functions of an organization is important PRIMARILY to enable:
A.
B.
C.
D.

Question 9 of 150

Question 10 of 150

10. Which of the following is the PRIMARY purpose of an acceptable use policy?
A.
B.
C.
D.

Question 10 of 150

Question 11 of 150

11. Which of the following is the BEST justification for making a revision to a password policy?
A.
B.
C.
D.

Question 11 of 150

Question 12 of 150

12. Which of the following is the MOST important consideration when determining which type of failover site to employ?
A.
B.
C.
D.

Question 12 of 150

Question 13 of 150

13. An organization's disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?
A.
B.
C.
D.

Question 13 of 150

Question 14 of 150

14. An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?
A.
B.
C.
D.

Question 14 of 150

Question 15 of 150

15. Which of the following tasks would provide a newly appointed information security manager with the BEST view of the organization's existing security posture?
A.
B.
C.
D.

Question 15 of 150

Question 16 of 150

16. The PRIMARY reason to create and externally store the disk hash value when performing forensic data acquisition from a hard disk is to:
A.
B.
C.
D.

Question 16 of 150

Question 17 of 150

17. While classifying information assets an information security manager notices that several production databases do not have owners assigned to them What is the BEST way to address this situation?
A.
B.
C.
D.

Question 17 of 150

Question 18 of 150

18. Prior to conducting a forensic examination, an information security manager should:
A.
B.
C.
D.

Question 18 of 150

Question 19 of 150

19. Senior management is concerned about data exposure through the use of public Al services. Which of the following is the information security manager's BEST course of action?
A.
B.
C.
D.

Question 19 of 150

Question 20 of 150

20. Which of the following components of an information security risk assessment is MOST valuable to senior management?
A.
B.
C.
D.

Question 20 of 150

Question 21 of 150

21. Which of the following should be the PRIMARY basis for an information security strategy?
A.
B.
C.
D.

Question 21 of 150

Question 22 of 150

22. A security incident has been reported within an organization When should an information security manager contact the information owner?
A.
B.
C.
D.

Question 22 of 150

Question 23 of 150

23. An organization's information security manager reads on social media that a recently purchased vendor product has been compromised and customer data has been posted online. What should the information security manager do FIRST?
A.
B.
C.
D.

Question 23 of 150

Question 24 of 150

24. Which of the following is MOST important to ensuring that incident management plans are executed effectively?
A.
B.
C.
D.

Question 24 of 150

Question 25 of 150

25. Predetermined containment methods to be used in a cybersecurity incident response should be based PRIMARILY on the:
A.
B.
C.
D.

Question 25 of 150

Question 26 of 150

26. An information security manager is alerted to multiple security incidents across different business units, with unauthorized access to sensitive data and potential data exfiltration from critical systems. Which of the following is the BEST course of action to appropriately classify and prioritize these incidents?
A.
B.
C.
D.

Question 26 of 150

Question 27 of 150

27. An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?
A.
B.
C.
D.

Question 27 of 150

Question 28 of 150

28. The PRIMARY objective of a post-incident review of an information security incident is to:
A.
B.
C.
D.

Question 28 of 150

Question 29 of 150

29. Which of the following should be the FIRST step when performing triage of a malware incident?
A.
B.
C.
D.

Question 29 of 150

Question 30 of 150

30. Relationships between critical systems are BEST understood by
A.
B.
C.
D.

Question 30 of 150

Question 31 of 150

31. Which of the following is the BEST starting point for a newly hired information security manager who has been tasked with identifying and addressing network vulnerabilities?
A.
B.
C.
D.

Question 31 of 150

Question 32 of 150

32. Which of the following is MOST important to include in an information security status report to senior management?
A.
B.
C.
D.

Question 32 of 150

Question 33 of 150

33. Of the following, who should be assigned as the owner of a newly identified risk related to an organization's new payroll system?
A.
B.
C.
D.

Question 33 of 150

Question 34 of 150

34. Which of the following is MOST important when designing security controls for new cloud-based services?
A.
B.
C.
D.

Question 34 of 150

Question 35 of 150

35. Which of the following activities is designed to handle a control failure that leads to a breach?
A.
B.
C.
D.

Question 35 of 150

Question 36 of 150

36. Which of the following should be the FIRST consideration when developing a strategy for protecting an organization's data?
A.
B.
C.
D.

Question 36 of 150

Question 37 of 150

37. Which of the following is the MOST effective way to detect information security incidents?
A.
B.
C.
D.

Question 37 of 150

Question 38 of 150

38. A business unit recently integrated the organization's new strong password policy into its business application which requires users to reset passwords every 30 days. The help desk is now flooded with password reset requests. Which of the following is the information security manager's BEST course of action to address this situation?
A.
B.
C.
D.

Question 38 of 150

Question 39 of 150

39. When drafting the corporate privacy statement for a public website, which of the following MUST be included?
A.
B.
C.
D.

Question 39 of 150

Question 40 of 150

40. Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?
A.
B.
C.
D.

Question 40 of 150

Question 41 of 150

41. Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?
A.
B.
C.
D.

Question 41 of 150

Question 42 of 150

42. In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?
A.
B.
C.
D.

Question 42 of 150

Question 43 of 150

43. Which of the following activities MUST be performed by an information security manager for change requests?
A.
B.
C.
D.

Question 43 of 150

Question 44 of 150

44. When determining an acceptable risk level which of the following is the MOST important consideration?
A.
B.
C.
D.

Question 44 of 150

Question 45 of 150

45. The MOST effective tools for responding to new and advanced attacks are those that detect attacks based on:
A.
B.
C.
D.

Question 45 of 150

Question 46 of 150

46. A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?
A.
B.
C.
D.

Question 46 of 150

Question 47 of 150

47. An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?
A.
B.
C.
D.

Question 47 of 150

Question 48 of 150

48. Which of the following is the BEST way to determine the gap between the present and desired state of an information security program?
A.
B.
C.
D.

Question 48 of 150

Question 49 of 150

49. Which of the following is MOST helpful to identify whether information security policies have been followed?
A.
B.
C.
D.

Question 49 of 150

Question 50 of 150

50. Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?
A.
B.
C.
D.

Question 50 of 150

Question 51 of 150

51. An organization successfully responded to an information security incident. However, the information security manager learned that some of the steps specified in the incident management procedures were not taken by the response team. What should be the information security manager's FIRST step?
A.
B.
C.
D.

Question 51 of 150

Question 52 of 150

52. Which of the following should be an information security manager s MOST important consideration when determining the priority for implementing security controls?
A.
B.
C.
D.

Question 52 of 150

Question 53 of 150

53. A risk assessment exercise has identified the threat of a denial of service (DoS) attack Executive management has decided to take no further action related to this risk. The MO ST likely reason for this decision is
A.
B.
C.
D.

Question 53 of 150

Question 54 of 150

54. An information security manager is MOST likely to obtain approval for a new security project when the business case provides evidence of:
A.
B.
C.
D.

Question 54 of 150

Question 55 of 150

55. An incident response team recently encountered an unfamiliar type of cyber event. Though the team was able to resolve the issue, it took a significant amount of time to identify. What is the BEST way to help ensure similar incidents are identified more quickly in the future?
A.
B.
C.
D.

Question 55 of 150

Question 56 of 150

56. Which of the following is the BEST reason to implement an information security architecture?
A.
B.
C.
D.

Question 56 of 150

Question 57 of 150

57. Which of the following presents the GREATEST challenge to a security operations center's wna GY of potential security breaches?
A.
B.
C.
D.

Question 57 of 150

Question 58 of 150

58. An anomaly-based intrusion detection system (IDS) operates by gathering data on:
A.
B.
C.
D.

Question 58 of 150

Question 59 of 150

59. Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?
A.
B.
C.
D.

Question 59 of 150

Question 60 of 150

60. The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness training program is to include:
A.
B.
C.
D.

Question 60 of 150

Question 61 of 150

61. Which of the following is MOST helpful for determining which information security policies should be implemented by an organization?
A.
B.
C.
D.

Question 61 of 150

Question 62 of 150

62. Which of the following is the BEST way to determine the effectiveness of an incident response plan?
A.
B.
C.
D.

Question 62 of 150

Question 63 of 150

63. Which of the following is MOST important for guiding the development and management of a comprehensive information security program?
A.
B.
C.
D.

Question 63 of 150

Question 64 of 150

64. The PRIMARY reason to properly classify information assets is to determine:
A.
B.
C.
D.

Question 64 of 150

Question 65 of 150

65. Which of the following is the MOST important issue in a penetration test?
A.
B.
C.
D.

Question 65 of 150

Question 66 of 150

66. Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
A.
B.
C.
D.

Question 66 of 150

Question 67 of 150

67. Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?
A.
B.
C.
D.

Question 67 of 150

Question 68 of 150

68. When selecting metrics to monitor the effectiveness of an information security program, it is MOST important for an information security manager to:
A.
B.
C.
D.

Question 68 of 150

Question 69 of 150

69. Which of the following should an organization do FIRST upon learning that a subsidiary is located in a country where civil unrest has just begun?
A.
B.
C.
D.

Question 69 of 150

Question 70 of 150

70. Which of the following is MOST helpful in the development of a cost-effective information security strategy that is aligned with business requirements?
A.
B.
C.
D.

Question 70 of 150

Question 71 of 150

71. Which of the following provides the MOST assurance that a third-party hosting provider will be able to meet availability requirements?
A.
B.
C.
D.

Question 71 of 150

Question 72 of 150

72. Which of the following is the PRIMARY objective of information asset classification?
A.
B.
C.
D.

Question 72 of 150

Question 73 of 150

73. Which of the following BEST facilitates recovery of data lost as a result of a cybersecurity incident?
A.
B.
C.
D.

Question 73 of 150

Question 74 of 150

74. Which of the following should include contact information for representatives of equipment and software vendors?
A.
B.
C.
D.

Question 74 of 150

Question 75 of 150

75. Which of the following is MOST important to include in an information security policy?
A.
B.
C.
D.

Question 75 of 150

Question 76 of 150

76. An organization's automated security monitoring tool generates an excessively large amount of falsq positives. Which of the following is the BEST method to optimize the monitoring process?
A.
B.
C.
D.

Question 76 of 150

Question 77 of 150

77. Which of the following is the MOST effective defense against malicious insiders compromising confidential information?
A.
B.
C.
D.

Question 77 of 150

Question 78 of 150

78. Which of the following should be an information security manager's FIRST course of action when one of the organization's critical third-party providers experiences a data breach?
A.
B.
C.
D.

Question 78 of 150

Question 79 of 150

79. Which of the following is MOST important to include in an information security strategy?
A.
B.
C.
D.

Question 79 of 150

Question 80 of 150

80. Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?
A.
B.
C.
D.

Question 80 of 150

Question 81 of 150

81. Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
A.
B.
C.
D.

Question 81 of 150

Question 82 of 150

82. An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:
* A bad actor broke into a business-critical FTP server by brute forcing an administrative password
* The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
* The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
* After three hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail Which of the following could have been prevented by conducting regular incident response testing?
A.
B.
C.
D.

Question 82 of 150

Question 83 of 150

83. A critical server for a hospital has been encrypted by ransomware. The hospital is unable to function effectively without this server Which of the following would MOST effectively allow the hospital to avoid paying the ransom?
A.
B.
C.
D.

Question 83 of 150

Question 84 of 150

84. Which of the following is PRIMARILY determined by asset classification?
A.
B.
C.
D.

Question 84 of 150

Question 85 of 150

85. Which of the following is the GREATEST benefit of performing a tabletop exercise of the business continuity plan (BCP)?
A.
B.
C.
D.

Question 85 of 150

Question 86 of 150

86. When deciding to move to a cloud-based model, the FIRST consideration should be:
A.
B.
C.
D.

Question 86 of 150

Question 87 of 150

87. Which of the following BEST indicates that an organization has effectively tested its business continuity and disaster recovery plans within the stated recovery time objectives (RTOs)?
A.
B.
C.
D.

Question 87 of 150

Question 88 of 150

88. Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
A.
B.
C.
D.

Question 88 of 150

Question 89 of 150

89. Which of the following BEST facilitates effective strategic alignment of security initiatives?
A.
B.
C.
D.

Question 89 of 150

Question 90 of 150

90. Which of the following should be the FIRST step in developing an information security strategy?
A.
B.
C.
D.

Question 90 of 150

Question 91 of 150

91. Which of the following should an information security manager do FIRST when developing an organization's disaster recovery plan (DRP)?
A.
B.
C.
D.

Question 91 of 150

Question 92 of 150

92. Which of the following is MOST important to the effectiveness of an information security steering committee?
A.
B.
C.
D.

Question 92 of 150

Question 93 of 150

93. Which of the following is the PRIMARY reason to review the firewall logs when an external network-based attack is reported by the intrusion detection system (IDS)?
A.
B.
C.
D.

Question 93 of 150

Question 94 of 150

94. Which of the following is the MOST likely reason for a vulnerability scanner to return incomplete results?
A.
B.
C.
D.

Question 94 of 150

Question 95 of 150

95. Which of the following provides the BEST input to determine the level of protection needed for an IT system?
A.
B.
C.
D.

Question 95 of 150

Question 96 of 150

96. Which of the following is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?
A.
B.
C.
D.

Question 96 of 150

Question 97 of 150

97. A department has reported that a security control is no longer effective. Which of the following is the information security manager's BEST course of action?
A.
B.
C.
D.

Question 97 of 150

Question 98 of 150

98. Which of the following should be done NEXT following senior management's decision to comply with new personal data regulations that are much more stringent than those currently followed to avoid massive fines?
A.
B.
C.
D.

Question 98 of 150

Question 99 of 150

99. An organization faces severe fines and penalties if not in compliance with local regulatory requirements by an established deadline. Senior management has asked the information security manager to prepare an action plan to achieve compliance.
A.
B.
C.
D.

Question 99 of 150

Question 100 of 150

100. Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?
A.
B.
C.
D.

Question 100 of 150

Question 101 of 150

101. Which of the following would be MOST important to include in a proposal justifying investments for an organization's information security program?
A.
B.
C.
D.

Question 101 of 150

Question 102 of 150

102. Which of the following BEST enables an organization to maintain an appropriate security control environment?
A.
B.
C.
D.

Question 102 of 150

Question 103 of 150

103. Reevaluation of risk is MOST critical when there is:
A.
B.
C.
D.

Question 103 of 150

Question 104 of 150

104. Management decisions concerning information security investments will be MOST effective when they are based on:
A.
B.
C.
D.

Question 104 of 150

Question 105 of 150

105. An organization has identified IT failures in a call center application. Of the following, who should own this risk?
A.
B.
C.
D.

Question 105 of 150

Question 106 of 150

106. When developing a categorization method for security incidents, the categories MUST:
A.
B.
C.
D.

Question 106 of 150

Question 107 of 150

107. What should be the GREATEST concern for an information security manager of a large multinational organization when outsourcing data processing to a cloud service provider?
A.
B.
C.
D.

Question 107 of 150

Question 108 of 150

108. An organization engages a third-party vendor to monitor and support a financial application under scrutiny by regulators. Which of the following controls would MOST effectively manage risk to the organization?
A.
B.
C.
D.

Question 108 of 150

Question 109 of 150

109. When defining a security baseline, it is MOST important that the baseline:
A.
B.
C.
D.

Question 109 of 150

Question 110 of 150

110. What should a global information security manager do FIRST when informed that a new regulation with significant impact will go into effect soon?
A.
B.
C.
D.

Question 110 of 150

Question 111 of 150

111. An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
A.
B.
C.
D.

Question 111 of 150

Question 112 of 150

112. Which of the following BEST facilitates an information security manager's efforts to obtain senior management commitment for an information security program?
A.
B.
C.
D.

Question 112 of 150

Question 113 of 150

113. Which of the following is the GREATEST challenge with assessing emerging risk in an organization?
A.
B.
C.
D.

Question 113 of 150

Question 114 of 150

114. An information security manager has recently been notified of potential security risks associated with a third- party service provider. What should be done NEXT to address this concern?
A.
B.
C.
D.

Question 114 of 150

Question 115 of 150

115. An organization wants to migrate a proprietary application to be hosted by a third-party cloud hosting provider using a Platform as a Service (PaaS) model. Prior to selecting the cloud provider, what is MOST important for the organization to ensure?
A.
B.
C.
D.

Question 115 of 150

Question 116 of 150

116. Which of the following will have the GREATEST influence on the successful adoption of an information security governance program?
A.
B.
C.
D.

Question 116 of 150

Question 117 of 150

117. The effectiveness of an incident response team will be GREATEST when:
A.
B.
C.
D.

Question 117 of 150

Question 118 of 150

118. An organization's marketing department wants to use an online collaboration service, which is not in compliance with the information security policy, A risk assessment is performed, and risk acceptance is being pursued. Approval of risk acceptance should be provided by:
A.
B.
C.
D.

Question 118 of 150

Question 119 of 150

119. Which of the following BEST helps to enable the desired information security culture within an organization?
A.
B.
C.
D.

Question 119 of 150

Question 120 of 150

120. Which of the following is a PRIMARY function of an incident response team?
A.
B.
C.
D.

Question 120 of 150

Question 121 of 150

121. Which of the following is MOST important for an information security manager to consider when developing a business continuity plan (BCP) for ransomware attacks?
A.
B.
C.
D.

Question 121 of 150

Question 122 of 150

122. Which of the following elements of a service contract would BEST enable an organization to monitor the information security risk associated with a cloud service provider?
A.
B.
C.
D.

Question 122 of 150

Question 123 of 150

123. Which of the following factors would have the MOST significant impact on an organization's information security governance mode?
A.
B.
C.
D.

Question 123 of 150

Question 124 of 150

124. Which of the following has The GREATEST positive impact on The ability to execute a disaster recovery plan (DRP)?
A.
B.
C.
D.

Question 124 of 150

Question 125 of 150

125. Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?
A.
B.
C.
D.

Question 125 of 150

Question 126 of 150

126. Which of the following BEST enables an incident response team to determine appropriate actions during an initial investigation?
A.
B.
C.
D.

Question 126 of 150

Question 127 of 150

127. An organization is transitioning to a Zero Trust architecture. Which of the following is the information security manager's BEST approach for communicating the implications of this transition to the board of directors?
A.
B.
C.
D.

Question 127 of 150

Question 128 of 150

128. An information security manager learns that an existing supplier plans to begin using its recently developed generative AI technology for the same scope of service. A risk assessment was performed on the supplier three months ago with no outstanding findings. Which of the following is the BEST course of action to address the associated risk?
A.
B.
C.
D.

Question 128 of 150

Question 129 of 150

129. Which of the following has the MOST influence on the inherent risk of an information asset?
A.
B.
C.
D.

Question 129 of 150

Question 130 of 150

130. Which of the following should be the PRIMARY focus of an organization with immature incident detection capabilities?
A.
B.
C.
D.

Question 130 of 150

Question 131 of 150

131. When an organization experiences a disruptive event, the business continuity plan (BCP) should be triggered PRIMARILY based on:
A.
B.
C.
D.

Question 131 of 150

Question 132 of 150

132. Which of the following is the BEST indication that an organization has a mature information security culture?
A.
B.
C.
D.

Question 132 of 150

Question 133 of 150

133. In order to understand an organization's security posture, it is MOST important for an organization's senior leadership to:
A.
B.
C.
D.

Question 133 of 150

Question 134 of 150

134. Which type of plan is PRIMARILY intended to reduce the potential impact of security events that may occur?
A.
B.
C.
D.

Question 134 of 150

Question 135 of 150

135. The PRIMARY consideration when responding to a ransomware attack should be to ensure:
A.
B.
C.
D.

Question 135 of 150

Question 136 of 150

136. The PRIMARY objective of timely declaration of a disaster is to:
A.
B.
C.
D.

Question 136 of 150

Question 137 of 150

137. The information security manager has been notified of a new vulnerability that affects key data processing systems within the organization Which of the following should be done FIRST?
A.
B.
C.
D.

Question 137 of 150

Question 138 of 150

138. A PRIMARY benefit of adopting an information security framework is that it provides:
A.
B.
C.
D.

Question 138 of 150

Question 139 of 150

139. The PRIMARY advantage of involving end users in continuity planning is that they:
A.
B.
C.
D.

Question 139 of 150

Question 140 of 150

140. A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?
A.
B.
C.
D.

Question 140 of 150

Question 141 of 150

141. An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
A.
B.
C.
D.

Question 141 of 150

Question 142 of 150

142. An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
A.
B.
C.
D.

Question 142 of 150

Question 143 of 150

143. Who is BEST suited to determine how the information in a database should be classified?
A.
B.
C.
D.

Question 143 of 150

Question 144 of 150

144. Which of the following events is MOST likely to require an organization to revisit its information security framework?
A.
B.
C.
D.

Question 144 of 150

Question 145 of 150

145. Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?
A.
B.
C.
D.

Question 145 of 150

Question 146 of 150

146. Which of the following is the MOST important reason for an information security manager to archive and retain the organization's electronic communication and email data?
A.
B.
C.
D.

Question 146 of 150

Question 147 of 150

147. An information security manager has identified that security risks are not being treated in a timely manner.
A.
B.
C.
D.

Question 147 of 150

Question 148 of 150

148. Which of the following should be established FIRST when implementing an information security governance framework?
A.
B.
C.
D.

Question 148 of 150

Question 149 of 150

149. Which of the following BEST indicates that information assets are classified accurately?
A.
B.
C.
D.

Question 149 of 150

Question 150 of 150

150. Which of the following is the BEST way to evaluate the effectiveness of physical and environmental security controls implemented for fire-related disasters?
A.
B.
C.
D.

Question 150 of 150