Question 626

An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization's critical systems?
  • Question 627

    A new application has entered the production environment with deficient technical security controls. Which of the following is MOST Likely the root cause?
  • Question 628

    Primary direction on the impact of compliance with new regulatory requirements that may lead to major application system changes should be obtained from the:
  • Question 629

    A third party was engaged to develop a business application. Which of the following would an information security manager BEST test for the existence of back doors?
  • Question 630

    What is the MOST effective access control method to prevent users from sharing files with unauthorized users?