A global logistics company is developing its first formal information security program. The CISO has a limited budget and needs to demonstrate early value to the board. Which of the following approaches represents the most effective initial step in establishing a risk management framework?
Q2Multiple answers
A healthcare provider recently suffered a data breach originating from a third-party billing service. The security manager is now tasked with strengthening the vendor management program. Which TWO of the following controls are most critical to implement to prevent a recurrence? (Select TWO)
Q3
A security manager is briefing the executive team on the phases of incident response. They want to explain the primary goal of the 'Containment' phase in a way that resonates with business leaders. What is the most accurate and business-focused description of this phase?
Q4
True or False: A security 'standard' is a high-level, principle-based document that establishes an organization's security intent and goals, while a 'policy' provides mandatory, specific configurations or rules to enforce those standards.
Q5
A fast-growing e-commerce company is struggling with its vulnerability management program. The security team performs monthly scans, but the development teams are overwhelmed by the volume of findings and are slow to patch. As the security manager, what is the most critical process improvement to implement first?
Q6
**Case Study** A mid-sized financial services firm, FinSecure, has recently decided to migrate a significant portion of its on-premises infrastructure to a public cloud provider. The CISO, reporting to the CIO, has been tasked with leading this initiative from a security perspective. The company culture is highly risk-averse, and the board is concerned about meeting stringent regulatory compliance requirements (like PCI DSS and GDPR) in the cloud. The project team is composed of traditional network and system administrators who have limited cloud experience. The CISO's primary objective is to build a secure and compliant cloud environment without stifling the agility benefits the company hopes to gain. The initial project plan from the IT team focuses heavily on a 'lift-and-shift' migration of existing virtual machines and security appliances. The CISO is concerned this approach will not adequately address cloud-native security challenges and may be more costly in the long run. What is the most effective strategy the CISO should advocate for to ensure the long-term security and success of the cloud migration project?
Q7
A SOC manager is evaluating technologies to reduce analyst fatigue and improve response times. They are considering a SOAR (Security Orchestration, Automation, and Response) platform. What is the primary function of a SOAR platform in a SOC environment?
Q8
As part of integrating security into a mature CI/CD pipeline, a security architect recommends several testing methodologies. Which approach uses instrumentation within a running application during dynamic testing to identify vulnerabilities in real-time?
Q9
A security manager is defining endpoint protection requirements for a company with a large remote workforce. The primary concerns are zero-day threats and fileless malware. Which technology is most essential for addressing these specific threats?
Q10
A company's Acceptable Use Policy (AUP) is outdated and widely ignored by employees. The security manager needs to revitalize the policy framework. Which of the following is the most important factor for creating an effective and enforceable AUP?