Question 296
What is the BEST way to ensure that contract programmers comply with organizational security policies?
Question 297
An information security manager has been alerted to a possible incident involving a breach at one of the organization's vendors. Which of the following should be done FIRST?
Question 298
Which of the following activities should take place FIRST when a security patch for Internet software is received from a vendor?
Question 299
An incident response team has determined there is a need to isolate a system that is communicating with a known malicious host on the Internet. Which of the following stakeholders should be contacted FIRST?
Question 300
To achieve effective strategic alignment of security initiatives, it is important that: