An employee who is a remote user has copied financial data from the corporate server to a laptop using virtual private network (VPN) connectivity. Which of the following is the MOST important factor to determine if it should be classified as a data leakage incident?
When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager?
Which of the following is MOST important to complete during the recovery phase of an incident response process before bringing affected systems back online?
Which of the following is the BEST reason for senior management to support a business case for developing a monitoring system for a critical application?
Which of the following should be the PRIMARY focus for an information security manager when reviewing access controls for data stored in an off-premise cloud environment?
Which of the following is the MOST effective defense against malicious insiders compromising confidential information?
Which of the following is the BEST option to lower the cost to implement application security controls?
An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?
Who is accountable for ensuring proper controls are in place to address the confidentiality and availability of an information system?
Which of the following should be of GREATEST concern regarding an organization's security controls?
What is the PRIMARY objective of performing a vulnerability assessment following a business system update?
Of the following, who is accountable for data loss in the event of an information security incident at a third-party provider?
An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?
Which of the following is MOST likely to reduce the effectiveness of a SIEM system?
An organization provides notebook PCs, cable wire locks, smartphone access, and virtual private network (VPN) access to its remote employees. Which of the following is MOST important for the information security manager to ensure?
Which of the following is the GREATEST challenge with assessing emerging risk in an organization?
Which of the following eradication methods is MOST appropriate when responding to an incident resulting in malware on an application server?
During the selection of a Software as a Service (SaaS) vendor for a business process, the vendor provides evidence of a globally accepted information security certification. Which of the following is the MOST important consideration?
Which of the following is the BEST approach for managing user access permissions to ensure alignment with data classification?
Which is MOST important to identify when developing an effective information security strategy?