What is the BEST way to achieve on-going compliance monitoring in an organization?
You have implemented a new security control. Which of the following risk strategy options have you engaged in?
The executive board has requested that the CISO of an organization define and Key Performance Indicators (KPI) to measure the effectiveness of the security awareness program provided to call center employees. Which of the following can be used as a KPI?
Which of the following is considered the MOST effective tool against social engineering?
At which point should the identity access management team be notified of the termination of an employee?
Credit card information, medical data, and government records are all examples of:
An audit was conducted and many critical applications were found to have no disaster recovery plans in place. You conduct a Business Impact Analysis (BIA) to determine impact to the company for each application. What should be the NEXT step?
Which of the following is the MOST important for a CISO to understand when identifying threats?
Creating a secondary authentication process for network access would be an example of?
According to ISO 27001, of the steps for establishing an Information Security Governance program listed below, which comes first?
Which of the following is used to establish and maintain a framework to provide assurance that information security strategies are aligned with organizational objectives?
What is the SECOND step to creating a risk management methodology according to the National Institute of Standards and Technology (NIST) SP 800-30 standard?
Which of the following should be determined while defining risk management strategies?
Which of the following is MOST likely to be discretionary?
The purpose of NIST SP 800-53 as part of the NIST System Certification and Accreditation Project is to establish a set of standardized, minimum security controls for IT systems addressing low, moderate, and high levels of concern for