Question 26
Which of the following is the PRIMARY purpose of data classification?
Question 27
System logs and audit logs for sensitive systems should be stored
Question 28
Following a recent acquisition, an information security manager has been requested to address the outstanding risk reported early in the acquisition process. Which of the following is the manager s BEST course of action?
Question 29
The management staff of an organization that does not have a dedicated security function decides to use its IT manager to perform a security review. The MAIN job requirement in this arrangement is that the IT manager
Question 30
The root cause of a successful cross site request forgery (XSRF) attack against an application is that the vulnerable application: