Question 511

Which of the following is the BEST defense against distributed denial of service (DDoS) attacks?
  • Question 512

    Ensuring that activities performed by outsourcing providers comply with information security policies can BEST be accomplished through the use of:
  • Question 513

    Which of the following is the BEST control to minimize the risk associated with loss of information as a result of ransomware exploiting a zero-day vulnerability?
  • Question 514

    The BEST way to justify the implementation of a single sign-on (SSO) product is to use:
  • Question 515

    Which of the following is the BEST way to address any gaps identified during an outsourced provider selection and contract negotiation process?