Question 656

The configuration management plan should PRIMARILY be based upon input from:
  • Question 657

    Which of the following controls is MOST effective in providing reasonable assurance of physical access compliance to an unmanned server room controlled with biometric devices?
  • Question 658

    In performing a risk assessment on the impact of losing a server, the value of the server should be calculated using the:
  • Question 659

    Which of the following is MOST effective in preventing weaknesses from being introduced into existing production systems?
  • Question 660

    An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization's critical systems?