Question: 1
Which of the following should be an information security manager's.
MOST important consideration when determining if an information asset has been classified appropriately?
Question: 2
A legacy application does not comply with new regulatory requirements to encrypt sensitive data at rest, and remediating this issue would require significant investment. What should the information security manager do FIRST?
Question: 3
When management changes the enterprise business strategy, which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?
Question: 4
In a multinational organization, local security regulations should be implemented over global security policy because:
Question: 5
What should be an information security manager's FIRST step when developing a business case for a new intrusion detection system (IDS) solution?