You company suspects an employee of sending unauthorized emails to competitors. These emails are alleged to contain confidential company dat a. Which of the following is the most important step for you to take in preserving the chain of custody?
Correct Answer:
A
Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?
Correct Answer:
A
Which of the following statements are true about security risks? Each correct answer represents a complete solution. Choose three.
Correct Answer:
ACD
Which of the following statements about the availability concept of Information security management is true?
Correct Answer:
B
Fill in the blank with the appropriate phrase. is the ability to record and report on the configuration baselines associated with each configuration item at any moment of time.
Correct Answer:
A