Question: 1
Which of the following is the MOST significant advantage of developing a well-defined information security strategy?
Question: 2
An information security manager has discovered that a business unit is planning on implementing a new
application and has not engaged anyone from the information security department. Which of the following is
the BEST course of action?
Question: 3
Which of the following is MOST important to have in place to effectively manage security incidents that could potentially escalate to disasters?
Question: 4
An information security manager has noticed a large number of security policy exceptions have been approved by business unit leaders. Which of the following would be the BEST course of action to address this situation?
Question: 5
An information security team has been tasked with identifying confidential data within the organization to formalize its asset classification scheme. The MOST relevant input would be provided by: