Question: 1
Which of the following should an information security manager do NEXT after creating a roadmap to execute the strategy for an information security program?
Question: 2
An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the system?
Question: 3
When a critical system incident is reported, the FIRST step of the incident handler should be to:
Question: 4
An online trading company discovers that a network attack has penetrated the firewall. What should be the information security manager's FIRST response?
Question: 5
Which of the following is the MOST effective approach to ensure IT processes are performed in compliance with the information security policies?