Topic 1: Exam Pool A
Senior management has launched an enterprise-wide initiative to streaming internal
processes to reduce costs, including security processes. What should the information security manager rely on MOST
to allocate resources efficiently?
A.
Return on investment (ROI)
B.
Risk classification
C.
Capability maturity assessment
D.
Internal audit reports
Risk classification
An information security manager has become aware that a third-party provider is not in
compliance with the statement of work (SOW). Which of the following is the BEST course
of action?
A.
Assess the extent of the issue.
B.
Initiate contract renegotiation
C.
Notify senior management of the issue
D.
Report the issue to legal personnel
Notify senior management of the issue
The effectiveness of an incident response team will be GREATEST when:
A.
the incident response team meets on a regular basis to review log files
B.
the incident response team members are trained security personnel
C.
the incident response process is updated based on lessons learned.
D.
incidents are identified using a security information and event monitoring (SIEM) system.
the incident response process is updated based on lessons learned.
Which of the following should be an information security manager's PRIMARY focus during
the development of a critical system storing highly confidential data?
A.
Ensuring the amount of residual risk is acceptable
B.
Reducing the number of vulnerabilities detected
C.
Complying with regulatory requirements
D.
Avoiding identified system threats
Ensuring the amount of residual risk is acceptable
An information security manager notes that security incidents are not being appropriately
escalated by the help desk after tickets are logged.
Which of the following is the BEST automated control to resolve this issue?
A.
Integrating automated service level agreement (SLA) reporting into the help desk
ticketing system
B.
Integrating incident response workflow into the help desk ticketing system
C.
Implementing automated vulnerability scanning in the help desk workflow
D.
Changing the default setting for all security incidents to the highest priority
Integrating automated service level agreement (SLA) reporting into the help desk
ticketing system
Page 19 out of 61 Pages |
Previous |