An anomaly-based intrusion detection system (IDS) operates by gathering data on:
An organization permits the storage and use of its critical and sensitive information on employee-owned smartphones. Which of the following is the BEST security control?
Which of the following is MOST important to have in place when conducting a security control assessment of a system?
Which of the following is an information security manager's BEST course of action when a penetration test reveals a security exposure due to a firewall that is not configured correctly?
Which of the following is the MOST effective defense against malicious insiders compromising confidential information?
Which of the following is MOST important for an information security manager to consider when identifying information security resource requirements?
Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?
Which of the following BEST supports information security management in the event of organizational changes in security personnel?