Question 26
Which of the following would be an information security managers PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
Question 27
Who is ultimately responsible for ensuring that information is categorized and that protective measures are taken?
Question 28
What should an Information security manager do FIRST to ensure an organization's security policies remain relevant for a cloud adoption?
Question 29
Which of the following is the MOST important element to ensure the successful recovery of a business during a disaster?
Question 30
System logs and audit logs for sensitive systems should be stored