Question: 1
Which of the following should be an information security manager's MOST important criterion for determining when to review the incident response plan?
Question: 2
When developing an escalation process for an incident response plan, the information security manager should PRIMARILY consider the:
Question: 3
Which of the following BEST protects against phishing attacks?
Question: 4
Following a risk assessment, new countermeasures have been approved by management. Which of the following should be performed NEXT?
Question: 5
An employee clicked on a link in a phishing email, triggering a ransomware attack. Which of the following should be the information security manager's FIRST step?