Question 26
Which of the following is LEASTLIKELY to be the result of a global pandemic impacting on information security?
Question 27
Which of the following is NOT a valid statement to include in an organisation's security policy?
Question 28
When securing a wireless network, which of the following is NOT best practice?
Question 29
Why might the reporting of security incidents that involve personal data differ from other types of security incident?
Question 30
What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controls procedures during a critical emergency situation?