Question: 1
Which of the following is MOST important to ensure when an organization is moving portions of its sensitive database to the cloud?
Question: 2
Which of the following is the FIRST step in developing a business continuity plan (BCP)?
Question: 3
An anomaly-based intrusion detection system (IDS) operates by gathering data on:
Question: 4
Which of the following would provide the MOST value to senior management when presenting the results of a risk assessment?
Question: 5
A critical vulnerability is found on a server hosting multiple applications owned by different business units. One of the business units finds its hosted application will not function with the patch applied and chooses to accept the risk. Which of the following should be the information security manager's NEXT course of action?