Question 656
The configuration management plan should PRIMARILY be based upon input from:
Question 657
Which of the following controls is MOST effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices?
Question 658
In performing a risk assessment on the impact of losing a server, the value of the server should be calculated using the:
Question 659
Which of the following is MOST effective in preventing weaknesses from being introduced into existing production systems?
Question 660
An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization's critical systems?