Question: 1
An IT department is having difficulty controlling the installation and use of unauthorized software that is in breach of organizational policy. Which of the following is the MOST effective solution?
Question: 2
Information security can BEST be enforced by making security:
Question: 3
Following a highly sensitive data breach at a large company, all servers and workstations were patched. The information security manager s NEXT step should be to:
Question: 4
An information security manager finds that corporate information has been stored on a public cloud storage site for business collaboration purposes. Which of the following should be the manager's FIRST action?
Question: 5
What is the BEST way to determine the level of risk associated with information assets processed by an IT application?