Question 486
Which of the following is an inherent weakness of signature-based intrusion detection systems?
Question 487
Which of the following would be the BEST way for a company to reduce the risk of data loss resulting from employee-owned devices accessing the corporate email system?
Question 488
What is the PRIMARY role of the information security program?
Question 489
Which of the following would BEST help to ensure an organization's security program is aligned with business objectives?
Question 490
An IT department has given a vendor remote access to the internal network for troubleshooting network performance problems. After discovering the remote activity during a firewall log review, which of the following is the FIRST course of action for an information security manager?