Question 611
Which of the following is the MOST appropriate method of ensuring password strength in a large organization?
Question 612
When the computer incident response team (CIRT) finds clear evidence that a hacker has penetrated the corporate network and modified customer information, an information security manager should FIRST notify:
Question 613
An organization planning to contract with a cloud service provider is concerned about the risk of account hijacking at login. What is MOST important for the organization in its security requirements to address this concern?
Question 614
A digital signature using a public key infrastructure (PKI) will:
Question 615
An information security manager learns of a new international standard related to information security. Which of the following would be the BEST course of action?