Which of the following is critical in creating a security program aligned with an organization’s goals?
Which of the following represents the BEST method of ensuring security program alignment to business needs?
Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?
Which of the following information may be found in table top exercises for incident response?
When selecting a security solution with reoccurring maintenance costs after the first year, the CISO should: (choose the BEST answer)
A CISO sees abnormally high volumes of exceptions to security requirements and constant pressure from business units to change security processes. Which of the following represents the MOST LIKELY cause of this situation?
Which of the following best summarizes the primary goal of a security program?
Which of the following is considered one of the most frequent failures in project management?
An application vulnerability assessment has identified a security flaw in an application. This is a flaw that was previously identified and remediated on a prior release of the application. Which of the following is MOST likely the reason for this recurring issue?
Which of the following functions evaluates risk present in IT initiatives and/or systems when implementing an information security program?
Your incident response plan should include which of the following?
A system was hardened at the Operating System level and placed into the production environment. Months later an audit was performed and it identified insecure configuration different from the original hardened state. Which of the following security issues is the MOST likely reason leading to the audit findings?
Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?
When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?
A department within your company has proposed a third party vendor solution to address an urgent, critical business need. As the CISO you have been asked to accelerate screening of their security control claims. Which of the following vendor provided documents is BEST to make your decision: