Question: 1
An employee used network logon credentials on a personal shopping site. The site was breached, resulting in an unauthorized person logging onto the network with the employee's credentials via remote access. What is the BEST recommendation to prevent recurrence of similar unauthorized logins?
Question: 2
Which of the following would be the BEST evidence to present to senior management in favor of continuing a
successful investment in an organization's information security awareness program?
Question: 3
Which of the following is the BEST way to address risk associated with using an outsourced technology
service provider?
Question: 4
An organization is considering the adoption of cloud service providers for its expanding global business
operations. Which of the following is MOST important for the information security manager to review with
regard to data protection?
Question: 5
Which of the following is the MOST effective way to motivate staff members to fulfill their information security responsibilities?