Question 6 of 20

An organization’s strategy requires an information security management system to be established.
What BEST supports this strategic requirement?
Answer

Suggested Answer

The suggested answer is C.

Question 7 of 20

A large organization has a small, centralized information security management team, but most information security work is devoted to the many independent product teams. The central team defines policy, and makes recommendations about tools and automation, but each product team makes its own decisions about how to meet the policy.
What is the BEST approach to ensure information security is managed consistently across this organization?
Answer

Suggested Answer

The suggested answer is B.

Question 8 of 20

A supplier provides business data that is critical to the organization’s business. This supplier must log in to a server on the organization’s network to update the data on a regular basis.
What should the organization use to ensure that only authorized supplier staff perform these updates?
Answer

Suggested Answer

The suggested answer is B.

Question 9 of 20

An organization has mapped the value stream for resolving incidents, and has identified many handoffs to and from third parties. These handoffs require potentially sensitive information to be shared so that the incidents can be resolved, and this results in a risk that information might be leaked.
What TWO things should the organization do to manage this risk?
1. Resolve all incidents that involve sensitive information using in-house staff only
2. Automatically detect sensitive information and remove it when it is not essential for the supplier
3. Ensure contracts specify how the suppliers should manage this information
4. Delete all sensitive data from incident records so that is cannot be leaked during incident investigation
Answer

Suggested Answer

The suggested answer is B.

Question 10 of 20

The information security team is having difficulty working with the supplier management team. All other aspects of information security management work very well, but contracts with suppliers are often inadequate.
What is the HIGHEST capability level that the organization’s information security management practice demonstrates?
Answer

Suggested Answer

The suggested answer is B.