Question 16
Which of the following is considered to be the GREATEST risk to information systems that results from deploying end-to-end Internet of Things (IoT) solutions?
Question 17
Which of the following is NOT a valid statement to include in an organisation's security policy?
Question 18
In order to maintain the currency of risk countermeasures, how often SHOULD an organisation review these risks?
Question 19
According to ISO/IEC 27000, which of the following is the definition of a vulnerability?
Question 20
What does a penetration test do that a Vulnerability Scan does NOT?