Question: 1
Which of the following should an information security manager establish FIRST to ensure security-related activities are adequately monitored?
Question: 2
For a user of commercial software downloaded from the Internet, which of the following is the MOST effective means of ensuring authenticity?
Question: 3
An information security manager learns users of an application are frequently using emergency elevated access privileges to process transactions Which of the following should be done FIRST?
Question: 4
Which of the following is MOST important when selecting a third-party security operations center?
Question: 5
Which of the following is two MOST important step when establishing guidelines for the use of social networking sites in an organization?