Which two components PRIMARILY must be assessed in an effective risk analysis?
Which of the following should be the FIRST step to ensure system updates are applied in a timely manner?
Which of the following BEST measures the effectiveness of an organization's information security strategy?
An information security manager has discovered a potential security breach in a server that supports a critical business process. Which of the following should be the information security manager's FIRST course of action?
After a risk has been mitigated, which of the following is the BEST way to help ensure residual risk remains within an organization's established risk tolerance?