Which of the following is MOST likely to result from a properly conducted post-incident review?

Which of the following is MOST likely to result from a properly conducted post-incident review?A . Breach information is provided to the organization’s key stakeholders and users.B . The cause of the incident is discovered and remediated.C . Forensic evidence is reviewed and provided to law enforcementD . The incident response team discovers inefficiencies...

Continue reading

Before final acceptance of residual risk, what is the BEST way for an information security manager to address risk factors determined to be lower than acceptable risk levels?

Before final acceptance of residual risk, what is the BEST way for an information security manager to address risk factors determined to be lower than acceptable risk levels?A . Implement more stringent countermeasures.B . Evaluate whether an excessive level of control is being applied.C . Ask senior management to increase the acceptable risk levelsD...

Continue reading

Which of the following is a PRIMARY security responsibility of an information owner?

Which of the following is a PRIMARY security responsibility of an information owner?A . Testing information classification controlsB . Determining the controls associated with information classificationC . Maintaining the integrity of data in the information systemD . Deciding what level of classification the information requires View Answer Answer: D...

Continue reading

Which of the following is the BEST way for an information security manager to prevent this situation from reoccurring?

A third-party contract signed by a business unit manager failed to specify information security requirements. Which of the following is the BEST way for an information security manager to prevent this situation from reoccurring?A . Inform business unit management of the information security requirements.B . Provide information security training to the business unitsC ....

Continue reading