An organization is close to going live with the implementation of a cloud-based application. Independent penetration test results have been received that show a high-rated vulnerability. Which of the following would be the BEST way to proceed?
Correct Answer:
D
During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?
Correct Answer:
B
Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?
Correct Answer:
A
Security metrics are the most important to include in a report to key stakeholders regarding the effectiveness of an information security program because they provide objective and measurable evidence of security performance and progress. Security metrics can include measures such as the number and severity of security incidents, the level of compliance with security policies and standards, the effectiveness of security controls, and the return on investment (ROI) of security initiatives. The other choices may also be included in a security report, but security metrics are the most important.
An information security program is a set of policies, procedures, standards, guidelines, and tools that aim to protect an organization’s information assets from threats and ensure compliance with laws and regulations. The effectiveness of an information security program depends on various factors, such as the organization’s risk appetite, business objectives, resources, culture, and external environment. Regular reporting to key stakeholders, such as senior management, the board of directors, and business partners, is critical to maintaining their support and buy-in for the program. The report should provide clear and concise information on the program’s status, achievements, challenges, and future plans, and it should be tailored to the audience’s needs and expectations.
Which of the following provides an information security manager with the MOST accurate indication of the organization's ability to respond to a cyber attack?
Correct Answer:
D
Which of the following is the PRIMARY benefit of implementing a vulnerability assessment process?
Correct Answer:
A