Question: 1
Who should be responsible for determining the classification of data within a database used in conjunction with an enterprise application?
Question: 2
Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?
Question: 3
A payroll application system accepts individual user sign-on IDs and then connects to its database using a single application ID. The GREATEST weakness under this system architecture is that:
Question: 4
Senior management is alarmed by recent media reports of severe security incidents at competing organizations Which of the following would provide the BEST assurance that the organization's current security measures are performing adequately?
Question: 5
An information security manager recently received funding for a vulnerability scanning tool to replace manual assessment techniques and needs to justify the expense of the tool going forward. Which of the following metrics would BEST indicate the tool is effective?