Question 421
Which of the following is MOST effective in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application?
Question 422
Which of the following would be the MOST important goal of an information security governance program?
Question 423
Which of the following is the BEST approach for an organization desiring to protect its intellectual property?
Question 424
Which of the following techniques MOST clearly indicates whether specific risk-reduction controls should be implemented?
Question 425
A new port needs to be opened in a perimeter firewall. Which of the following should be the FIRST step before initiating any changes?