Question 46
Which of the following would be MOST important to include in a business case to help obtain senior management's commitment for an information security investment?
Question 47
There is reason to believe that a recently modified web application has allowed unauthorized access. Which is the BEST way to identify an application backdoor?
Question 48
What is the MOST important role of an organization's data custodian in support of the information security function?
Question 49
A customer credit card database has been breached by hackers. The FIRST step in dealing with this attack should be to:
Question 50
After a risk assessment, it is determined that the cost to mitigate the risk is much greater than the benefit to be derived. The information security manager should recommend to business management that the risk be: