Question 31
Which of the following is the MOST effective type of access control?
Question 32
It is MOST important that information security architecture be aligned with which of the following?
Question 33
Evidence from a compromised server has to be acquired for a forensic investigation. What would be the BEST source?
Question 34
In an organization, the responsibilities for IT security are clearly assigned and enforced and an IT security risk and impact analysis is consistently performed. This represents which level of ranking in the information security governance maturity model?
Question 35
Which of the following is MOST important to the successful implementation of an information security governance framework across the organization?