Question 666
Which of the following is an example of a corrective control?
Question 667
When configuring a biometric access control system that protects a high-security data center, the system's sensitivity level should be set:
Question 668
Which of the following practices BEST supports the achievement of information security program objectives in the IT function?
Question 669
What should an information security manager do FIRST upon learning of a significant regulatory change that impacts how the organization should safeguard critical data?
Question 670
An information security manager is analyzing a risk that is believed to be severe, but lacks numerical evidence to determine the impact the risk could have on the organization. In this case the information security manager should: