Question 81
The PRIORITY action to be taken when a server is infected with a virus is to:
Question 82
A third party was engaged to develop a business application. Which of the following would an information security manager BEST test for the existence of back doors?
Question 83
Which of the following is the MOST effective way to protect the authenticity of data in transit?
Question 84
An information security manager is developing a new information security strategy. Which of the following functions would serve as the BEST resource to review the strategy and provide guidance for business alignment?
Question 85
Which of the following should an information security manager consider when reviewing an existing security investment plan?