1.
An information security manager is asked to provide evidence that the organization is fulfilling its legal obligation to protect personally identifiable information (PII). Which of the following would be MOST helpful for this purpose?
2.
Which of the following is the MOST important factor to ensure information security is meeting the organization's objectives?
3.
Which of the following is the MOST important consideration in a bring your own device (BYOD) program to protect company data in the event of a loss?
4.
Which of the following is the GREATEST benefit of integrating information security program requirements into vendor management?
5.
Which of the following is a step in establishing a security policy?
6.
Which of the following is the BEST way to determine if an organization's current risk is within the risk appetite?
7.
An organization with a strict need-to-know information access policy is about to launch a knowledge management intranet. Which of the following is the MOST important activity to ensure compliance with existing security policies?
8.
Which of the following if the MOST significant advantage of developing a well-defined information security strategy?
9.
Which of the following is an important criterion for developing effective key risk indicators (KRIs) to monitor information security risk?
10.
When implementing security architecture, an information security manager MUST ensure that security controls: