Question 711

An information security manager is advised by contacts in law enforcement that there is evidence that his/ her company is being targeted by a skilled gang of hackers known to use a variety of techniques, including social engineering and network penetration. The FIRST step that the security manager should take is to:
  • Question 712

    Identification and prioritization of business risk enables project managers to:
  • Question 713

    The PRIMARY consideration when defining recovery time objectives (RTOs) for information assets is:
  • Question 714

    In designing a backup strategy that will be consistent with a disaster recovery strategy, the PRIMARY factor to be taken into account will be the:
  • Question 715

    Which of the following is MOST useful to include in a report to senior management on a regular basis to demonstrate the effectiveness of the information security program?