Question: 1
An organization has implemented a new security control in response to a recently discovered vulnerability. Several employees have voiced concerns that the control disrupts their ability to work. Which of the following is the information security manager's BEST course of action?
Question: 2
Which of the following is MOST important to include in a contract with a critical service provider to help ensure alignment with the organization's information security program?
Question: 3
An organization has fallen victim to a spear-phishing attack that compromised the multi-factor authentication code. What is the information security manager's MOST important follow-up action?
Question: 4
Which of the following is the MOST effective method of determining security priorities?
Question: 5
Which of the following is MOST important to ensuring that incident management plans are executed effectively?