Which of the following is the MOST important benefit of an effective security governance process?
A security officer wants to implement a vulnerability scanning program. The officer is uncertain of the state of vulnerability resiliency within the organization’s large IT infrastructure. What would be the BEST approach to minimize scan data output while retaining a realistic view of system vulnerability?
Ensuring that the actions of a set of people, applications and systems follow the organization’s rules is BEST described as:
When deploying an Intrusion Prevention System (IPS) the BEST way to get maximum protection from the system is to deploy it
A Security Operations Centre (SOC) manager is informed that a database containing highly sensitive corporate strategy information is under attack. Information has been stolen and the database server was disconnected. Who must be informed of this incident?
A security manager has created a risk program. Which of the following is a critical part of ensuring the program is successful?
When creating a vulnerability scan schedule, who is the MOST critical person to communicate with in order to ensure impact of the scan is minimized?
Which of the following has the GREATEST impact on the implementation of an information security governance model?
Which of the following should be determined while defining risk management strategies?
Which of the following is MOST important when dealing with an Information Security Steering committee: