An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
An organization plans to leverage popular social network platforms to promote its products and services. Which of the following is the BEST course of action for the information security manager to support this initiative?
Which of the following is MOST important to have in place for an organization's information security program to be effective?
When defining a security baseline, it is MOST important that the baseline:
Which of the following is the GREATEST inherent risk when performing a disaster recovery plan (DRP) test?
When drafting the corporate privacy statement for a public website, which of the following MUST be included?
An organization's quality process can BEST support security management by providing:
An information security manager learns through a threat intelligence service that the organization may be targeted for a major emerging threat. Which of the following is the information security manager's FIRST course of action?
ACISO learns that a third-party service provider did not notify the organization of a data breach that affected the service provider's data center. Which of the following should the CISO do FIRST?
The PRIMARY purpose for conducting cybersecurity risk assessments is to:
Which of the following will provide the MOST guidance when deciding the level of protection for an information asset?
Which of the following is MOST important when responding to a major security incident?
When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?
Which of the following is the MOST effective way to address an organizations security concerns during contract negotiations with a third party?
An organization permits the storage and use of its critical and sensitive information on employee-owned smartphones. Which of the following is the BEST security control?
When creating an incident response plan, the PRIMARY benefit of establishing a clear definition of a security incident is that it helps to:
Which of the following is the PRIMARY benefit of training service desk staff to recognize incidents?
Which of the following should be the PRIMARY objective for creating a culture of security within an organization?
A security incident has been reported within an organization. When should an information security manager contact the information owner?
Which of the following is MOST important when defining how an information security budget should be allocated?
TESTED 01 Mar 2026