Question 156
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
Question 157
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?
Question 158
Which of the following BEST guards against the risk of attack by hackers?
Question 159
A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?
Question 160
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?