Question 41

Data owners are normally responsible for which of the following?
  • Question 42

    A mission-critical system has been identified as having an administrative system account with attributes that prevent locking and change of privileges and name. Which would be the BEST approach to prevent successful brute forcing of the account?
  • Question 43

    Which of the following should be the PRIMARY focus of a post-incident review following a successful response to a cybersecurity incident?
  • Question 44

    Which of the following metrics would provide management with the MOST useful information about the progress of a security awareness program?
  • Question 45

    Which of the following approaches is BEST for selecting controls to minimize information security risks?