Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?
Which of the following will ensure confidentiality of content when accessing an email system over the Internet?
A newly appointed information security manager has been asked to update all security-related policies and procedures that have been static for five years or more. What should be done NEXT?
Which of the following would be the BEST way to reduce the risk of disruption resulting from an emergency system change?
An investigation of a recent security incident determined that the root cause was negligent handing of incident alerts by system admit manager to address this issue?
Which of the following is BEST to include in a business case when the return on investment (ROI) for an information security initiative is difficult to calculate?
An organization's main product is a customer-facing application delivered using Software as a Service (SaaS). The lead security engineer has just identified a major security vulnerability at the primary cloud provider. Within the organization, who is PRIMARILY accountable for the associated task?
An online trading company discovers that a network attack has penetrated the firewall. What should be the information security manager's FIRST response?