Question: 1
An information security manager finds a legacy application has no defined data owner. Of the following, who would be MOST helpful in identifying the appropriate data owner?
Question: 2
Which of the following is the BEST justification for making a revision to a password policy?
Question: 3
An organization's HR department requires that employee account privileges be removed from all corporate IT systems within three days of termination to comply with a government regulation. However, the systems all have different user directories, and it currently takes up to four weeks to remove the privileges. Which of the following would BEST enable regulatory compliance?
Question: 4
Which of the following should be done FIRST to ensure a new critical cloud application can be supported by internal personnel?
Question: 5
Which of the following is the MOST important output from a post-incident review?