Question 81

The PRIORITY action to be taken when a server is infected with a virus is to:
  • Question 82

    A third party was engaged to develop a business application. Which of the following would an information security manager BEST test for the existence of back doors?
  • Question 83

    Which of the following is the MOST effective way to protect the authenticity of data in transit?
  • Question 84

    An information security manager is developing a new information security strategy. Which of the following functions would serve as the BEST resource to review the strategy and provide guidance for business alignment?
  • Question 85

    Which of the following should an information security manager consider when reviewing an existing security investment plan?