Question 511
Which of the following is the BEST defense against distributed denial of service (DDoS) attacks?
Question 512
Ensuring that activities performed by outsourcing providers comply with information security policies can BEST be accomplished through the use of:
Question 513
Which of the following is the BEST control to minimize the risk associated with loss of information as a result of ransomware exploiting a zero-day vulnerability?
Question 514
The BEST way to justify the implementation of a single sign-on (SSO) product is to use:
Question 515
Which of the following is the BEST way to address any gaps identified during an outsourced provider selection and contract negotiation process?