Question: 1
A company is considering a new automated system that requires implementation of wireless devices for data capture. Even though
wireless is not an approved technology, senior management has accepted the risk and approved a Proof-of-Concept (POC) to evaluate
the technology and proposed solution. Which of the following is the information security manager's BEST course of action?
Question: 2
An information security manager should begin a business continuity planning (BCP) process by:
Question: 3
Which of the following is the MOST significant contributor to the effectiveness of an incident response plan?
Question: 4
Which of the following is the MOST effective mechanism for communicating risk status and trends to senior management?
Question: 5
Embedding security responsibilities into jab descriptions is important PRIMARILY because it