Question 41
Data owners are normally responsible for which of the following?
Question 42
A mission-critical system has been identified as having an administrative system account with attributes that prevent locking and change of privileges and name. Which would be the BEST approach to prevent successful brute forcing of the account?
Question 43
Which of the following should be the PRIMARY focus of a post-incident review following a successful response to a cybersecurity incident?
Question 44
Which of the following metrics would provide management with the MOST useful information about the progress of a security awareness program?
Question 45
Which of the following approaches is BEST for selecting controls to minimize information security risks?