Question 746

An organization has contracted with an outsourcing company to address a security gap. Which of the following is the BEST way to determine if the security gap has been addressed?
  • Question 747

    An information security manager suspects that the organization has suffered a ransomware attack. What should be done FIRST
  • Question 748

    Which of the following threats is prevented by using token-based authentication?
  • Question 749

    The MAIN reason for an information security manager to monitor industry level changes in the business and IT is to:
  • Question 750

    An information security manager learns of a new international standard related to information security. Which of the following would be the BEST course of action?