Question: 1
Which of the following should be PRIMARILY included in a security training program for business process owners?
Question: 2
Which of the following MOST effectively prevents internal users from modifying sensitive data?
Question: 3
A new program has been implemented to standardize security configurations across a multinational organization Following implementation, the configuration standards should:
Question: 4
Within a security governance framework, which of the following is the MOST important characteristic of the information security committee? The committee:
Question: 5
An intrusion prevention system (IPS) has reported a significant increase in the number of hacking attempts over the past month,
though no systems have actually been compromised. Which of the following should the information security manager do FIRST?