Question 151

During the security review of organizational servers, it was found that a file server containing confidential human resources (HR) data was accessible to all user IDs. As a FIRST step, the security manager should:
  • Question 152

    Which of the following is MOST important to consider when determining the effectiveness of the Information security governance program?
  • Question 153

    Which of the following is MOST relevant for an information security manager to communicate to business units?
  • Question 154

    A company's mail server allows anonymous file transfer protocol (FTP) access which could be exploited.
    What process should the information security manager deploy to determine the necessity for remedial action?
  • Question 155

    Which of the following is the BEST way to enhance training for incident response teams?