Question 876
A database was compromised by guessing the password for a shared administrative account and confidential customer information was stolen. The information security manager was able to detect this breach by analyzing which of the following?
Question 877
An organization manages payroll and accounting systems for multiple client companies. Which of the following contract terms would indicate a potential weakness for a disaster recovery hot site?
Question 878
During which phase of an incident response process should corrective actions to the response procedure be considered and implemented?
Question 879
Which of the following groups would be in the BEST position to perform a risk analysis for a business?
Question 880
Which of the following is the MOST appropriate board-level activity for information security governance?