Question 71

The authorization to transfer the handling of an internal security incident to a third-party support provider is PRIMARILY defined by the:
  • Question 72

    Which of the following analyses will BEST identify the external influences to an organization's information security?
  • Question 73

    Which of the following is the MOST effective solution for preventing individuals external to the organization from modifying sensitive information on a corporate database?
  • Question 74

    When segregation of duties concerns exists between IT support staff and end users, what would be a suitable compensating control?
  • Question 75

    After detecting an advanced persistent threat (APT), which of the following should be the information security manager's FIRST step?