Which of the following risk scenarios is MOST likely to emerge from a supply chain attack?
Correct Answer:
C
Which of the following presents the GREATEST challenge to the recovery of critical systems and data following a ransomware incident?
Correct Answer:
D
According to the Certified Information Security Manager (CISM) Study Guide, the greatest challenge to the recovery of critical systems and data following a ransomware incident is the availability and integrity of backups. If the backups are unavailable or corrupt, it becomes much more difficult, if not impossible, to recover the systems and data. This highlights the importance of regularly testing and verifying the backup and recovery process to ensure that the backups are available and can be used in the event of an incident. Additionally, it is important to ensure that backups are stored securely and off-line to prevent them from being encrypted or deleted by an attacker.
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
Correct Answer:
C
The PRIMARY advantage of involving end users in continuity planning is that they:
Correct Answer:
A
When designing a disaster recovery plan (DRP), which of the following MUST be available in order to prioritize system restoration?
Correct Answer:
A
A BIA is an important part of Disaster Recovery Planning (DRP). It helps identify the impact of a disruption on the organization, including the critical systems and processes that must be recovered in order to minimize that impact. The BIA results are used to prioritize system restoration and determine the resources needed to get the organization back into operation as quickly as possible.