1. With limited resources in the information security department, which of the following is the BEST approach for managing security risk?
A) Implement technical solutions to automate security management activities. B) Prioritize security activities and report to management. C) Hire additional information security staff. D) Engage a third-party company to provide security support.
2. When an information security manager presents an information security program status report to senior management, the MAIN focus should be:
A) critical risks indicators. B) key controls evaluation. C) key performance indicators (KPIs). D) net present value (NPV).
3. Reviewing which of the following would provide the GREATEST input to the asset classification process?
A) Risk assessment B) Replacement cost of the asset C) Sensitivity of the data D) Compliance requirements
4. Which of the following should be an information security manager's MOST important concern to ensure admissibility of information security evidence from cyber crimes?
A) Chain of custody B) Tools used for evidence analysis C) Forensics contractors D) Efficiency of the forensics team
5. Which of the following information security metrics is the MOST difficult to quantify?
A) Cost of security incidents prevented B) Percentage of controls mapped to industry frameworks C) Extent of employee security awareness D) Proportion of control costs to asset value
Leave a comment