To prepare for a third-party forensics investigation following an incident involving malware, the incident response team should:
An organization has suffered from a large-scale security event impacting a critical system. Following the decision to restore the system at an alternate location, which plan should be invoked?
Senior management recently approved a mobile access policy that conflicts with industry best practices. Which of the following is the information security manager's BEST course of action when developing security standards for mobile access to the organization's network?
Following a risk assessment, an organization has made the decision to adopt a bring your own device (BYOD) strategy. What should the information security manager do NEXT?
Which of the following is MOST important for the successful implementation of an incident response plan?
When building support for an information security program, which of the following elements is MOST important?
For event logs to be acceptable for incident investigation, which of the following is the MOST important consideration to establish chain of evidence?