Question: 1
An information security manager has identified a major security event with potential noncompliance implications. Who should be notified FIRST?
Question: 2
An organization is developing a disaster recovery strategy and needs to identify each application's criticality so that the recovery sequence can be established. Which of the following is the BEST course of action?
Question: 3
Which of the following is the MOST important step when establishing guidelines for the use of social networking sites in an organization?
Question: 4
An organization has established a bring your own device (BYOD) program. Which of the following is the MOST important security consideration when allowing employees to use personal devices for corporate applications remotely?
Question: 5
An information security manager has identified the organization is not in compliance with new legislation that will soon be in effect. Which of the following is MOST important to consider when determining additional controls to be implemented?