Question: 1
The BEST way 10 establish a security baseline is by documenting
Question: 2
An information security manager has determined that the mean time to prioritize information security incidents has increased to an unacceptable level. Which of the following processes would BEST enable the information security manager to address this concern?
A. Forensic analysis
B. Incident response
Question: 3
2The business advantage of implementing authentication tokens is that they:
Question: 4
An organization which uses external cloud services extensively is concerned with risk monitoring and timely response. The BEST way to
address this concern is to ensure:
Question: 5
Which of the following is the BEST indication that the information secunty strategy is delivering business value?