00:00

QUESTION 16

A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?

Correct Answer: C

QUESTION 17

When deciding to move to a cloud-based model, the FIRST consideration should be:

Correct Answer: C

QUESTION 18

An organization is increasingly using Software as a Service (SaaS) to replace in-house hosting and support of IT applications. Which of the following would be the MOST effective way to help ensure procurement decisions consider information security concerns?

Correct Answer: A

QUESTION 19

Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?

Correct Answer: C

QUESTION 20

The PRIMARY objective of a post-incident review of an information security incident is to:

Correct Answer: C
The primary objective of a post-incident review of an information security incident is to identify the root cause of the incident and determine what can be done to prevent a similar incident from happening in the future. This process helps organizations to learn from past incidents and make improvements to their security posture to reduce the risk of future incidents. By conducting a thorough post-incident review, organizations can identify areas for improvement in their security controls, policies, and procedures, and implement changes to prevent similar incidents from happening in the future. Other important objectives of a post-incident review may include updating the risk profile, minimizing impact, and determining the impact of the incident, but the main focus should be on identifying ways to prevent recurrence.