Question 296

What is the BEST way to ensure that contract programmers comply with organizational security policies?
  • Question 297

    An information security manager has been alerted to a possible incident involving a breach at one of the organization's vendors. Which of the following should be done FIRST?
  • Question 298

    Which of the following activities should take place FIRST when a security patch for Internet software is received from a vendor?
  • Question 299

    An incident response team has determined there is a need to isolate a system that is communicating with a known malicious host on the Internet. Which of the following stakeholders should be contacted FIRST?
  • Question 300

    To achieve effective strategic alignment of security initiatives, it is important that: