Question 21

Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?
  • Question 22

    A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:
  • Question 23

    Which of the following disaster recovery testing techniques is the MOST cost-effective way to determine the effectiveness of the plan?
  • Question 24

    An organization learns that a third party has outsourced critical functions to another external provider. Which of the following is the information security manager's MOST important course of action?
  • Question 25

    The effectiveness of the information security process is reduced when an outsourcing organization: