Question 121
A data-hosting organization's data center houses servers, applications, and data for a large number of geographically dispersed customers. Which of the following strategies would be the BEST approach for developing a physical access control policy for the organization?
Question 122
Of the following, who should have responsibility for assessing the security risk associated with an outsourced cloud provider contract?
Question 123
An intrusion detection system should be placed:
Question 124
When developing a new application, which of the following is the BEST approach to ensure compliance with security requirements?
Question 125
Data owners must provide a safe and secure environment to ensure confidentiality, integrity and availability of the transaction. This is an example of an information security: