1. An organization's senior management is encouraging employees to use social media for promotional purposes. Which of the following should be the information security manager's FIRST step to support this strategy?
A) Incorporate social media into the security awareness program. B) Develop a guideline on the acceptable use of social media. C) Develop a business case for a data loss prevention solution. D) Employ the use of a web content filtering solution.
2. Of the following, whose input is of GREATEST importance in the development of an information security strategy?
A) End users B) Corporate auditors C) Process owners D) Security architects
3. Which of the following BEST enables an information security manager to determine the comprehensiveness of an organization's information security strategy?
A) Business impact analysis B) Organizational risk appetite C) Independent security audit D) Security risk assessment
4. An information security manager is developing a business case for an investment in an information security control. The FIRST step should be to:
A) research vendor pricing to show cost efficiency B) assess potential impact to the organization C) demonstrate increased productivity of security staff D) gain audit buy-in for the security control
5. Which of the following techniques would be the BEST test of security effectiveness?
A) Performing an external penetration test B) Reviewing security policies and standards C) Reviewing security logs D) Analyzing technical security practices
Leave a comment