Question 586
An organization is concerned with the risk of information leakage caused by incorrect use of personally owned smart devices by employees. What is the BEST way for the information security manager to mitigate the associated risk?
Question 587
Which of the following processes can be used to remediate identified technical vulnerabilities?
Question 588
Which of the following MUST be established before implementing a data loss prevention (DLP) system?
Question 589
Which of the following is MOST appropriate for inclusion in an information security strategy?
Question 590
A large number of exceptions to an organization's information security standards have been granted after senior management approved a bring your own device (BYOD) program. To address this situation, it is MOST important for the information security manager to: