Question 36

An organization has a process in place that involves the use of a vendor. A risk assessment was completed during the development of the process. A year after the implementation a monetary decision has been made to use a different vendor. What, if anything, should occur?
  • Question 37

    A security awareness program should:
  • Question 38

    Senior management has endorsed a comprehensive information security policy. Which of the following should the organization do NEXT?
  • Question 39

    An information security manager that is utilizing a public cloud is performing a root cause investigation of an incident that took place in that environment. Which of the following should be the security manager's MAIN concern?
  • Question 40

    Which of the following would be the BEST way for a company to reduce the risk of data loss resulting from employee-owned devices accessing the corporate email system?