Question 286
Which of the following would be the MOST important goal of an information security governance program?
Question 287
The MOST effective way to ensure that outsourced service providers comply with the organization's information security policy would be:
Question 288
Which of the following controls would BEST prevent accidental system shutdown from the console or operations area?
Question 289
Risk identification, analysis, and mitigation activities can BEST be integrated into business life cycle processes by linking them to:
Question 290
A new port needs to be opened in a perimeter firewall. Which of the following should be the FIRST step before initiating any changes?