Question: need detailed answers for the each question Security program development is PRIMARILY driven by which of the following? A. Regulatory requirements B. Business strategy C.
need detailed answers for the each question
Security program development is PRIMARILY driven by which of the following?
- A. Regulatory requirements
- B. Business strategy
- C. Risk appetite
- D. Available resources
Which of the following is the MOST effective way to help staff members understand their responsibilities for information security?
- A. Require staff to sign confidentiality agreements.
- B. Require staff to participate in information security awareness training.
- C. Communicate disciplinary processes for policy violations.
- D. Include information security responsibilities in job descriptions.
An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:
- A. risk assessment results.
- B. international security standards.
- C. the most stringent requirements.
- D. the security organization structure.
Which of the following is MOST helpful in ensuring an information security governance framework continues to support business objectives?
- A. A consistent risk assessment methodology
- B. A monitoring strategy
- C. An effective organizational structure
- D. Stakeholder buy-in
Which of the following is MOST important to determine following the discovery and eradication of a malware attack?
- A. The creator of the malware
- B. The malware entry path
- C. The type of malware involved
- D. The method of detecting the malware
Which of the following information security activities is MOST helpful to support compliance with information security policy?
- A. Conducting information security awareness programs
- B. Creating monthly trend metrics
- C. Performing periodic IT reviews on new system acquisitions
- D. Obtaining management commitment
Which of the following is MOST important to ensure ongoing senior management commitment to an organizations information security strategy?
- A. Effective and reliable security reporting
- B. A well-defined information security control framework
- C. A detailed and documented business impact analysis (BIA)
- D. Strategic alignment to an industry framework
What is the MOST important reason to regularly report information security risk to relevant stakeholders?
- A. To enable risk-informed decision making
- B. To reduce the impact of information security risk
- C. To ensure information security controls are effective
- D. To achieve compliance with regulatory requirements
An organization has identified a risk scenario that has low impact to the organization but is very costly to mitigate. Which risk treatment option is MOST appropriate in this situation?
- A. Transfer
- B. Acceptance
- C. Mitigation
- D. Avoidance
An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?
- A. Review independent security assessment reports for each vendor.
- B. Benchmark each vendor's services with industry best practices.
- C. Define information security requirements and processes.
- D. Analyze the risks and propose mitigating controls.
Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?
- A. Document a security exception.
- B. Reduce security hardening settings.
- C. Perform a risk assessment.
- D. Inform business management of the risk.
Which of the following is the MOST important factor of a successful information security program?
- A. The program follows industry best practices.
- B. The program is based on a well-developed strategy.
- C. The program is focused on risk management.
- D. The program is cost-efficient and within budget.
The PRIMARY benefit of introducing a single point of administration in network monitoring is that it:
- A. reduces unauthorized access to systems.
- B. promotes efficiency in control of the environment.
- C. prevents inconsistencies in information in the distributed environment.
- D. allows administrative staff to make management decisions.
Which of the following is MOST important for building a robust information security culture within an organization?
- A. Mature information security awareness training across the organization
- B. Security controls embedded within the development and operation of the IT environment
- C. Senior management approval of information security policies
- D. Strict enforcement of employee compliance with organizational security policies
Which of the following metrics BEST measures the effectiveness of an organizations information security program?
- A. Return on information security investment
- B. Number of information security business cases developed
- C. Reduction in information security incidents
- D. Increase in risk assessments completed
An organization is creating a risk mitigation plan that considers redundant power supplies to reduce the business risk associated with critical system outages. Which type of control is being considered?
- A. Deterrent
- B. Detective
- C. Preventive
- D. Corrective
Which of the following BEST enables an information security manager to determine the comprehensiveness of an organizations information security strategy?
- A. Internal security audit
- B. Organizational risk appetite
- C. External security audit
- D. Business impact analysis (BIA)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
