Question 486

Which of the following is an inherent weakness of signature-based intrusion detection systems?
  • Question 487

    Which of the following would be the BEST way for a company to reduce the risk of data loss resulting from employee-owned devices accessing the corporate email system?
  • Question 488

    What is the PRIMARY role of the information security program?
  • Question 489

    Which of the following would BEST help to ensure an organization's security program is aligned with business objectives?
  • Question 490

    An IT department has given a vendor remote access to the internal network for troubleshooting network performance problems. After discovering the remote activity during a firewall log review, which of the following is the FIRST course of action for an information security manager?