Question 746

An information security team plans to strengthen authentication requirements for a customer-facing site, but there are concerns it will negatively impact the user experience. Which of the following is the information security manager's BEST course of action?
  • Question 747

    Which of the following BEST describes the scope of risk analysis?
  • Question 748

    An organization's information security manager is performing a post-incident review of a security incident in which the following events occurred:
    * A bad actor broke into a business-critical FTP server by brute forcing an administrative password
    * The third-party service provider hosting the server sent an automated alert message to the help desk, but was ignored
    * The bad actor could not access the administrator console, but was exposed to encrypted data transferred to the server
    * After three (3) hours, the bad actor deleted the FTP directory, causing incoming FTP attempts by legitimate customers to fail Which of the following could have been prevented by conducting regular incident response testing?
  • Question 749

    Which of the following is MOST important to include in an information security strategy?
  • Question 750

    Which of the following should be done FIRST when developing an information security strategy that is aligned with organizational goals?