1.
When gathering security requirements for an automated business process improvement program, which of the following is MOST important?
2.
You manage a newly created Security Operations Center (SOC), your team is being inundated with security alerts and dont know what to do. What is the BEST approach to handle this situation?
3.
In order for a CISO to have true situational awareness there is a need to deploy technology that can give a real-time view of security events across the enterprise. Which tool selection represents the BEST choice to achieve situational awareness?
4.
Information Security is often considered an excessive, after-the-fact cost when a project or initiative is completed. What can be done to ensure that security is addressed cost effectively?
5.
Which of the following is the BEST indicator of a successful project?
6.
Which of the following is the MOST important component of any change management process?
7.
When selecting a security solution with reoccurring maintenance costs after the first year
8.
What oversight should the information security team have in the change management process for application security?
9.
An application vulnerability assessment has identified a security flaw in an application. This is a flaw that was previously identified and remediated on a prior release of the application. Which of the following is MOST likely the reason for this recurring issue?
10.
In effort to save your company money which of the following methods of training results in the lowest cost for the organization?