Identifying which of the following BEST enables a cyberattack to be contained?
Answer : B
Which of the following provides the BEST input to determine the level of protection needed for an IT system?
Answer : B
For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?
Answer : B
Which of the following is the PRIMARY reason that an information security manager should restrict the use of generic administrator accounts in a multi-user environment?
Answer : C
Which of the following metrics would provide an accurate measure of an information security program's performance?
Answer : A
Which of the following is MOST helpful in the development of a cost-effective information security strategy that is aligned with business requirements?
Answer : C
Which of the following should be updated FIRST to account for new regulatory requirements that impact current information security controls?
Answer : D