Which of the following would BEST ensure that security is integrated during application development?
Which of the following is the BEST control to protect customer personal information that is stored in the cloud?
Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?
An information security manager learns that a risk owner has approved exceptions to replace key controls with weaker compensating controls to improve process efficiency. Which of the following should be the GREATEST concern?
Which of the following should be the PRIMARY basis for determining the value of assets?
Which of the following BEST enables the restoration of operations after a limited ransomware incident occurs?
Which of the following provides the MOST comprehensive understanding of an organization's information security posture?