Question: 1
When a critical incident cannot be contained in a timely manner and the affected system needs to be taken offline, which of the following stakeholders MUST receive priority communication?
Question: 2
When reporting on the effectiveness of the information security program, which of the following is the BEST way lo demonstrate improvement m security performance?
Question: 3
An organization plans to implement a document collaboration solution to allow employees to share company information. Which of the following is the MOST important control to mitigate the risk associated with the new solution?
Question: 4
An internal control audit has revealed a control deficiency related to a legacy system where the compensating controls no longer appear to be effective. Which of the following would BEST help the information security manager determine the security requirements to resolve the control deficiency?
Question: 5
The responsibility for approving access to data according to the organization's data classification policy belongs to the: