Question: 1
A new key business application has gone to production. What is the Most important reason to classify and determine the sensitivity of the data used by this application?
Question: 2
Noncompliance issues were identified through audit. Which of the following is the BEST approach for the information security manager to ensure that issues are resolved in a timely manner?
Question: 3
Which of the following activities should be performed by someone other than the system administrator to ensure a secure audit trail?
Question: 4
An organization has decided to migrate a customer facing on-premise application to a cloud provider. Which of the following would be MOST helpful when assessing the proposed data backup requirements prior to the migration?
Question: 5
Which of the following is an information security manager's BEST course of action upon learning of new cybersecurity regulatory requirements that apply to the organization?