Question 476

When preparing a disaster recovery plan, which of the following would BEST help in prioritizing the restoration of business systems?
  • Question 477

    In an organization, the responsibilities for IT security are clearly assigned and enforced and an IT security risk and impact analysis is consistently performed. This represents which level of ranking in the information security governance maturity model?
  • Question 478

    When configuring a biometric access control system that protects a high-security data center, the system's sensitivity level should be set:
  • Question 479

    Which of the following threats is prevented by using token-based authentication?
  • Question 480

    A desktop computer that was involved in a computer security incident should be secured as evidence by: