Question: 1
Which of the following is the MOST effective way to facilitate the implementation of IT security program objectives?
Question: 2
A corporate web site has become compromised as a result of a malicious attack. Which of the following should the information security manager do FIRST?
Question: 3
Which of the following is MOST important in the development of metrics for the effectiveness of information security?
Question: 4
An information security manager has been made aware that implementing a control would have an adverse impact to the business. The business manager has suggested accepting the risk. The BEST course of action by the information security manager would be to:
Question: 5
Which of the following is the BEST method for management to obtain assurance of compliance with its security policy?