1.
When outsourcing information security administration, it is MOST important for an organization to include:
2.
An information security manager determines the organization's critical systems may be vulnerable to a new zero-day attack. The FIRST course of action is to:
3.
Which of the following provides the MOST relevant information to determine the overall effectiveness of an information security program and underlying business processes?
4.
Which of the following provides the GREATEST assurance that an organization allocates appropriate resources to respond to information security events?
5.
Which of the following should occur FIRST in the process of managing security risk associated with the transfer of data from unsupported legacy systems to supported systems?
6.
Which of the following would provide the MOST essential input for the development of an information security strategy?
7.
Which of the following is a PRIMARY security responsibility of an information owner?
8.
When implementing a new risk assessment methodology, which of the following is the MOST important requirement?
9.
What is the PRIMARY goal of an incident management program?
10.
Which of the following is the GREATEST potential exposure created by outsourcing to an application service provider?