Question 286

Which of the following would be the MOST important goal of an information security governance program?
  • Question 287

    The MOST effective way to ensure that outsourced service providers comply with the organization's information security policy would be:
  • Question 288

    Which of the following controls would BEST prevent accidental system shutdown from the console or operations area?
  • Question 289

    Risk identification, analysis, and mitigation activities can BEST be integrated into business life cycle processes by linking them to:
  • Question 290

    A new port needs to be opened in a perimeter firewall. Which of the following should be the FIRST step before initiating any changes?