Question 151
During the security review of organizational servers, it was found that a file server containing confidential human resources (HR) data was accessible to all user IDs. As a FIRST step, the security manager should:
Question 152
Which of the following is MOST important to consider when determining the effectiveness of the Information security governance program?
Question 153
Which of the following is MOST relevant for an information security manager to communicate to business units?
Question 154
A company's mail server allows anonymous file transfer protocol (FTP) access which could be exploited.
What process should the information security manager deploy to determine the necessity for remedial action?
What process should the information security manager deploy to determine the necessity for remedial action?
Question 155
Which of the following is the BEST way to enhance training for incident response teams?