Front
Back
Which is the MOST effective way to resolve noncompliance with information security standards?
Report noncompliance to the audit committee. This creates accountability at the highest governance level and compels corrective action.
Senior management commitment to information security is BEST obtained by presentations that:
Tie security risk directly to key business objectives so leadership understands business impact.
The MOST appropriate role for senior management in supporting information security is:
Approval of policy statements and funding, as policies express management intent and direction.
The BEST indicator of effective information security governance is:
A steering committee that approves security projects, ensuring alignment with business objectives.
Information security governance is PRIMARILY driven by:
Business strategy, because security must align with enterprise objectives.
The BEST evidence of a mature information security program is:
An effective information security strategy defining scope, responsibilities, and implementation.
Investments in information security technologies should be based on:
Value analysis supported by a sound business case showing risk mitigation vs cost.
The GREATEST success factor for effectively managing information security is:
Effective business relationships that secure executive and stakeholder support.
Centralized information security management is characterized by:
Better adherence to security policies due to consistency and centralized control.
Successful implementation of information security governance FIRST requires:
Updated security policies aligned with business objectives.
Front
Back
The PRIMARY objective of information risk management is to:
Ensure that information-related risks are identified, assessed, and managed within the enterprise’s risk appetite.
Risk appetite is BEST defined as:
The amount and type of risk an enterprise is willing to accept in pursuit of its objectives.
Which activity should occur FIRST in the risk management process?
Identification of information assets and associated risks.
The MOST important factor in determining risk treatment options is:
Alignment with business objectives and the enterprise risk appetite.
Which risk response option transfers risk to another party?
Risk transfer, typically achieved through insurance or outsourcing.
Residual risk is BEST described as:
The remaining level of risk after controls have been implemented.
Which metric BEST helps management understand information security risk?
Metrics that express risk in business impact terms such as financial loss or service disruption.
Threat modeling is MOST useful for:
Identifying potential threat scenarios and attack paths against critical assets.
Which scenario requires a formal risk reassessment?
Major changes to systems, business processes, or the threat environment.
The BEST way to communicate risk to senior management is by:
Presenting risk in terms of likelihood and impact on business objectives.
Front
Back
Which is the MOST effective way to resolve noncompliance with information security standards?
Report noncompliance to the audit committee. This creates accountability at the highest governance level and compels corrective action.