Question 746
An organization has contracted with an outsourcing company to address a security gap. Which of the following is the BEST way to determine if the security gap has been addressed?
Question 747
An information security manager suspects that the organization has suffered a ransomware attack. What should be done FIRST
Question 748
Which of the following threats is prevented by using token-based authentication?
Question 749
The MAIN reason for an information security manager to monitor industry level changes in the business and IT is to:
Question 750
An information security manager learns of a new international standard related to information security. Which of the following would be the BEST course of action?