Question 31

From an information security perspective, information that no longer supports the main purpose of the business should be:
  • Question 32

    What are the three stages of an identity and access management system?
  • Question 33

    An employee successfully avoids becoming a victim of a sophisticated spear phishing attack due to knowledge gained through the corporate information security awareness program. What type of control has been effectively utilized?
  • Question 34

    The PRIMARY objective for information security program development should be:
  • Question 35

    A recent audit has identified a few control exceptions and is recommending the implementation of technology and processes to address the finding. Which of the following is the MOST likely reason for the organization to reject the implementation of the recommended technology and processes?