Question 21
Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?
Question 22
A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:
Question 23
Which of the following disaster recovery testing techniques is the MOST cost-effective way to determine the effectiveness of the plan?
Question 24
An organization learns that a third party has outsourced critical functions to another external provider. Which of the following is the information security manager's MOST important course of action?
Question 25
The effectiveness of the information security process is reduced when an outsourcing organization: