Question 236
Which of the following would BEST protect an organization's confidential data stored on a laptop computer from unauthorized access?
Question 237
An information security manager is implementing controls to protect the organization's data. The FIRST step in this process should be to:
Question 238
The PRIMARY purpose of using risk analysis within a security program is to:
Question 239
A database was compromised by guessing the password for a shared administrative account and confidential customer information was stolen. The information security manager was able to detect this breach by analyzing which of the following?
Question 240
Which of the following is the MOST serious exposure of automatically updating virus signature files on every desktop each Friday at 11:00 p.m. (23.00 hrs.)?