Which of the following would be MOST important to include in a proposal justifying investments for an organization's information security program?
Answer : D
Comprehensive and Detailed Step-by-Step Explanation:
Justifying investments in information security requires aligning proposals with business objectives to gain management approval.
A . Vulnerability scan results: These provide technical insights but are insufficient for high-level justification.
B . Competitor benchmark analysis: While useful, this is less relevant than demonstrating direct alignment with organizational needs.
C . Previous security budget: Historical data may provide context but does not justify future needs.
D . Business requirements: This is the BEST answer because aligning security investments with business objectives demonstrates the value and necessity of the program to stakeholders.
Which of the following provides the BEST input to determine the level of protection needed for an IT system?
Answer : B
For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?
Answer : B
Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?
Answer : C
Which of the following metrics would provide an accurate measure of an information security program's performance?
Answer : A
An information security team must obtain approval from the information security steering committee to implement a key control. Which of the following is the MOST important input to assist the committee in making this decision?
Answer : C
Which of the following is MOST helpful in the development of a cost-effective information security strategy that is aligned with business requirements?
Answer : C