Which of the following would be the GREATEST obstacle to implementing incident notification and escalation processes in an organization with high turnover?
In violation of a policy prohibiting the use of cameras at the office, employees have been issued smartphones and tablet computers with enabled web cameras. Which of the following should be the information security manager's FIRST course of action?
The PRIMARY goal of a post-incident review should be to:
In addition to executive sponsorship and business alignment, which of the following is MOST critical for information security governance?
Due to changes in an organization's environment, security controls may no longer be adequate. What is the information security manager's BEST course of action?
Which of the following BEST demonstrates that an anti-phishing campaign is effective?
Which of the following is the MOST important issue in a penetration test?
Which of the following BEST indicates that an information security governance framework has been successfully implemented?
Which of the following should be the FIRST step when performing triage of a malware incident?
Which of the following is the MOST common cause of cybersecurity breaches?
Which of the following would be MOST effective in reducing the impact of a distributed denial of service (DDoS) attack?
Which of the following is the PRIMARY preventive method to mitigate risks associated with privileged accounts?
An organization is performing due diligence when selecting a third party. Which of the following is MOST helpful to reduce the risk of unauthorized sharing of information during this process?
An organization has multiple data repositories across different departments. The information security manager has been tasked with creating an enterprise strategy for protecting data. Which of the following information security initiatives should be the HIGHEST priority for the organization?
Which of the following BEST determines the data retention strategy and subsequent policy for an organization?
A small organization has a contract with a multinational cloud computing vendor. Which of the following would present the GREATEST concern to an information security manager if omitted from the contract?
An organization has just updated its backup capability to a new cloud-based solution. Which of the following tests will MOST effectively verify this change is working as intended?
An organization has acquired a new system with strict maintenance instructions and schedules. Where should this information be documented?
Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?
Which of the following eradication methods is MOST appropriate when responding to an incident resulting in malware on an application server?
Which of the following is MOST useful to an information security manager when determining the need to escalate an incident to senior?
A technical vulnerability assessment on a personnel information management server should be performed when:
Which of the following is MOST important when conducting a forensic investigation?
An information security manager has confirmed the organization's cloud provider has unintentionally published some of the organization's business data. Which of the following should be done NEXT?
Which of the following is MOST important for an organization to have in place to determine the effectiveness of information security governance?
An organization's automated security monitoring tool generates an excessively large amount of falsq positives. Which of the following is the BEST method to optimize the monitoring process?
Which of the following is the BEST indicator of an emerging incident?
Which of the following is a PRIMARY benefit of managed security solutions?
Which of the following provides the BEST input to determine the level of protection needed for an IT system?
Which of the following is the MOST likely reason for a vulnerability scanner to return incomplete results?
Which of the following is the BEST course of action when confidential information is inadvertently disseminated outside the organization?
Which of the following is the BEST way to assess the risk associated with using a Software as a Service (SaaS) vendor?
While conducting a test of a business continuity plan (BCP), which of the following is the MOST important consideration?
Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?
Which of the following BEST minimizes information security risk in deploying applications to the production environment?
Which of the following is MOST important for an information security manager to verify before conducting full-functional continuity testing?
Which of the following is MOST effective in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application?
Which of the following should be the FIRST consideration when developing a strategy for protecting an organization's data?
Which of the following BEST enables an information security manager to demonstrate the effectiveness of the information security and risk program to senior management?
Which of the following is MOST important to determine following the discovery and eradication of a malware attack?
Which of the following BEST enables the restoration of operations after a limited ransomware incident occurs?
Which of the following is the sole responsibility of the client organization when adopting a Software as a Service (SaaS) model?
Regular vulnerability scanning on an organization's internal network has identified that many user workstations have unpatched versions of software. What is the BEST way for the information security manager to help senior management understand the related risk?
An information security team is investigating an alleged breach of an organization's network. Which of the following would be the BEST single source of evidence to review?
An incident management team leader sends out a notification that the organization has successfully recovered from a cyberattack. Which of the following should be done NEXT?
An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?
Which of the following BEST enables staff acceptance of information security policies?
The MOST important reason for having an information security manager serve on the change management committee is to:
Which of the following provides the MOST comprehensive insight into ongoing threats facing an organization?
Which of the following is the BEST reason to implement an information security architecture?
Which of the following is the MOST important benefit of using a cloud access security broker when migrating to a cloud environment?
Which of the following is the BEST indication of an effective information security program?
An internal audit has revealed that a number of information assets have been inappropriately classified. To correct the classifications, the remediation accountability should be assigned to:
The PRIMARY objective of performing a post-incident review is to:
When testing an incident response plan for recovery from a ransomware attack, which of the following is MOST important to verify?
Data classification is PRIMARILY the responsibility of:
Which of the following is the BEST way to improve an organization's ability to detect and respond to incidents?
Which of the following should be the GREATEST consideration when determining the recovery time objective (RTO) for an in-house critical application, database, or server?
Which of the following is the BEST way to reduce the risk of security incidents from targeted email attacks?
The BEST way to ensure that frequently encountered incidents are reflected in the user security awareness training program is to include:
An information security manager learns of a new standard related to an emerging technology the organization wants to implement. Which of the following should the information security manager recommend be done FIRST?
Which of the following is the MOST important reason to ensure information security is aligned with the organization's strategy?
Which is the BEST method to evaluate the effectiveness of an alternate processing site when continuous uptime is required?
An information security manager developing an incident response plan MUST ensure it includes:
An organization's security policy is to disable access to USB storage devices on laptops and desktops. Which of the following is the STRONGEST justification for granting an exception to the policy?
An organization implemented a number of technical and administrative controls to mitigate risk associated with ransomware. Which of the following is MOST important to present to senior management when reporting on the performance of this initiative?
Which of the following roles is BEST suited to validate user access requirements during an annual user access review?
Which of the following is an example of risk mitigation?
Which of the following is the BEST way to evaluate the effectiveness of physical and environmental security controls implemented for fire-related disasters?
An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?
Which of the following would BEST ensure that security is integrated during application development?
A multinational organization is introducing a security governance framework. The information security manager's concern is that regional security practices differ. Which of the following should be evaluated FIRST?
Which of the following roles is BEST able to influence the security culture within an organization?
Meeting which of the following security objectives BEST ensures that information is protected against unauthorized disclosure?
Which of the following is the MOST important consideration when briefing executives about the current state of the information security program?
Following a risk assessment, an organization has made the decision to adopt a bring your own device (BYOD) strategy. What should the information security manager do NEXT?
Which of the following would BEST guide the development and maintenance of an information security program?
To help ensure that an information security training program is MOST effective its contents should be
Which of the following BEST enables the integration of information security governance into corporate governance?
Which of the following should be the FIRST step to gain approval for outsourcing to address a security gap?
Which of the following is MOST critical when creating an incident response plan?
Which of the following is MOST important for the improvement of a business continuity plan (BCP)?
Which of the following is MOST important to consider when choosing a shared alternate location for computing facilities?
Which of the following is the BEST method to protect against emerging advanced persistent threat (APT) actors?
After a recovery from a successful malware attack, instances of the malware continue to be discovered. Which phase of incident response was not successful?
Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
Which of the following is the PRIMARY reason to monitor key risk indicators (KRIs) related to information security?
An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?
Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?
Which of the following is the BEST indication that an organization has integrated information security governance with corporate governance?
An information security manager wants to document requirements detailing the minimum security controls required for user workstations. Which of the following resources would be MOST appropriate for this purposed?
The PRIMARY goal to a post-incident review should be to:
Which of the following would be MOST useful to a newly hired information security manager who has been tasked with developing and implementing an information security strategy?
Which of the following is the PRIMARY benefit achieved when an information security governance framework is aligned with corporate governance?
Which of the following factors has the GREATEST influence on the successful implementation of information security strategy goals?
Which of the following is MOST helpful in determining the criticality of an organization's business functions?
Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of
confidentiality?
Following an employee security awareness training program, what should be the expected outcome?
Which of the following is the MOST important outcome of effective risk treatment?
The effectiveness of an information security governance framework will BEST be enhanced if:
Which of the following BEST facilitates the effectiveness of cybersecurity incident response?
Which of the following provides the BEST evidence that a newly implemented security awareness program has been effective?
Which of the following is the PRIMARY reason to conduct a post-incident review?
Which of the following BEST enables an organization to maintain an appropriate security control environment?
Which of the following is the MOST important factor in successfully implementing Zero Trust?
Spoofing should be prevented because it may be used to:
The MOST effective tools for responding to new and advanced attacks are those that detect attacks based on:
Which of the following should be the PRIMARY basis for establishing metrics that measure the effectiveness of an information security program?
Which of the following is MOST important to include in a report to key stakeholders regarding the effectiveness of an information security program?
An information security manager is reporting on open items from the risk register to senior management. Which of the following is MOST important to communicate with regard to these risks?
When creating an incident response plan, the PRIMARY benefit of establishing a clear definition of a security incident is that it helps to:
An organization uses a security standard that has undergone a major revision by the certifying authority. The old version of the standard will no longer be used for organizations wishing to maintain their certifications. Which of the following should be the FIRST
course of action?
Which of the following is the BEST approach to reduce unnecessary duplication of compliance activities?
Which of the following is the PRIMARY reason for an information security manager to periodically review existing controls?
Which of the following should have the MOST influence on an organization's response to a new industry regulation?
Which of the following is the BEST way to help ensure an organization's risk appetite will be considered as part of the risk treatment process?
Embedding security responsibilities into job descriptions is important PRIMARILY because it:
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
Which of the following will have the GREATEST influence on the successful adoption of an information security governance program?
Which of the following will BEST facilitate the integration of information security governance into enterprise governance?
The PRIMARY goal when conducting post-incident reviews is to identify:
Which of the following BEST indicates the effectiveness of a recent information security awareness campaign delivered across the organization?
Which of the following defines the triggers within a business continuity plan (BCP)? @
Which of the following control types should be considered FIRST for aligning employee behavior with an organization's information security objectives?
The PRIMARY purpose for deploying information security metrics is to:
Which of the following would be the BEST way to reduce the risk of disruption resulting from an emergency system change?
Which of the following should an information security manager do FIRST after identifying suspicious activity on a PC that is not in the organization's IT asset inventory?
Threat and vulnerability assessments are important PRIMARILY because they are:
Senior management wants to thoroughly test a disaster recovery plan (DRP) for a mission-critical system. Which of the following would provide the MOST reliable results?
What is the PRIMARY objective of implementing standard security configurations?
Which of the following roles has the PRIMARY responsibility to ensure the operating effectiveness of IT controls?
Which of the following considerations is MOST important when selecting a third-party intrusion detection system (IDS) vendor?
An information security manager has been asked to provide both one-year and five-year plans for the information security program. What is the PRIMARY purpose for the long-term plan?
An information security manager is working to incorporate media communication procedures into the security incident communication plan. It would be MOST important to include:
Which of the following should be done NEXT following senior management's decision to comply with new personal data regulations that are much more stringent than those currently followed to avoid massive fines?
Which of the following plans should be invoked by an organization in an effort to remain operational during a disaster?
Which of the following is the MOST effective way to prevent information security incidents?
Which of the following is MOST important in increasing the effectiveness of incident responders?
Which of the following BEST enables an organization to enhance its incident response plan processes and procedures?
Which of the following is MOST important to include in an information security strategy?
The PRIMARY objective of timely declaration of a disaster is to:
An external security audit has reported multiple instances of control noncompliance. Which of the following is MOST important for the information security manager to communicate to senior management?
An anomaly-based intrusion detection system (IDS) operates by gathering data on:
Management decisions concerning information security investments will be MOST effective when they are based on:
Which of the following BEST facilitates the effective execution of an incident response plan?
Which of the following is the BEST approach when creating a security policy for a global organization subject to varying laws and regulations?
Which of the following is the BEST course of action when using a web application that has known vulnerabilities?
The categorization of incidents is MOST important for evaluating which of the following?
An organization has received complaints from users that some of their files have been encrypted. These users are receiving demands for money to decrypt the files. Which of the following would be the BEST course of action?
Which of the following is the GREATEST benefit of conducting an organization-wide security awareness program?
Which of the following is the PRIMARY impact of organizational culture on the effectiveness of an information security program?
A recovery point objective (RPO) is required in which of the following?
Which of the following is MOST important in order to obtain senior leadership support when presenting an information security strategy?
Following a successful attack, an information security manager should be confident the malware @ continued to spread at the completion of which incident response phase?
Which of the following provides the MOST effective response against ransomware attacks?
Which of the following BEST indicates that information security governance and corporate governance are integrated?
Which of the following is the PRIMARY reason to involve stakeholders from various business units when developing an information security policy?
Which risk is introduced when using only sanitized data for the testing of applications?
Which of the following is the MOST appropriate action during the containment phase of a cyber incident response?
Which of the following provides the BEST indication of the return on information security investment?
Which of the following has the GREATEST impact on the ability to successfully execute a disaster recovery plan (DRP)?
Which of the following MUST happen immediately following the identification of a malware incident?
A data discovery project uncovers an unclassified process document. Of the following, who is BEST suited to determine the classification?
Which of the following BEST indicates the effectiveness of the vendor risk management process?
Business objectives and organizational risk appetite are MOST useful inputs to the development of information security:
Which of the following BEST demonstrates the added value of an information security program?
An online bank identifies a successful network attack in progress. The bank should FIRST:
Which of the following tools would be MOST helpful to an incident response team?
Which of the following is the PRIMARY benefit of an information security awareness training program?
Which of the following BEST enables an organization to continuously assess the information security risk posture?
Which of the following provides an information security manager with the MOST accurate indication of the organization's ability to respond to a cyber attack?
Which of the following is the PRIMARY purpose of a business impact analysis (BIA)?
Which of the following is MOST important when designing an information security governance framework?
What should be the FIRST step when implementing data loss prevention (DLP) technology?
Which of the following is MOST important to consider when defining control objectives?
Which of the following should be done FIRST when implementing a security program?
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
A security incident has been reported within an organization. When should an information security manager contact the information owner?
A small organization with limited budget hires a new information security manager who finds the same IT staff member is assigned the responsibility of system administrator, security administrator, database administrator (DBA), and application administrator What is the manager's BEST course of action?
Which of the following is the BEST reason for an organization to use Disaster Recovery as a Service (DRaaS)?
Which of the following is the BEST approach for managing user access permissions to ensure alignment with data classification?
Which of the following factors would have the MOST significant impact on an organization's information security governance mode?
Which of the following would provide the MOST effective security outcome in an organizations contract management process?
When investigating an information security incident, details of the incident should be shared:
An information security team has confirmed that threat actors are taking advantage of a newly announced critical vulnerability within an application. Which of the following should be done
FIRST?
During the initiation phase of the system development life cycle (SDLC) for a software project, information security activities should address:
The PRIMARY advantage of single sign-on (SSO) is that it will:
An information security manager has identified that privileged employee access requests to production servers are approved; but user actions are not logged. Which of the following should be the GREATEST concern with this situation?
Recommendations for enterprise investment in security technology should be PRIMARILY based on:
A recent application security assessment identified a number of low- and medium-level vulnerabilities. Which of the following stakeholders is responsible for deciding the appropriate risk treatment option?
Recovery time objectives (RTOs) are BEST determined by:
Of the following, who would provide the MOST relevant input when aligning the information security strategy with organizational goals?
An organization has decided to outsource IT operations. Which of the following should be the PRIMARY focus of the information security manager?
An organization has suffered from a large-scale security event impacting a critical system. Following the decision to restore the system at an alternate location, which plan should be invoked?
Which of the following is the GREATEST benefit of using AI tools in security operations?
Which of the following is the BEST option to lower the cost to implement application security controls?
An organization provides notebook PCs, cable wire locks, smartphone access, and virtual private network (VPN) access to its remote employees. Which of the following is MOST important for the information security manager to ensure?
In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?
An organization needs to comply with new security incident response requirements. Which of the following should the information security manager do FIRST?
If the investigation of an incident is not completed within the time allocated in the incident response plan, which of the following actions should be taken by the incident response team?
Which of the following should be an information security manager's FIRST course of action when a potential business breach is discovered in a critical business system?
Which of the following is the MOST important criterion when deciding whether to accept residual risk?
Which of the following is the MOST important consideration when defining control objectives?
Which of the following documents should contain the INITIAL prioritization of recovery of services?
A software vendor has announced a zero-day vulnerability that exposes an organization's critical business systems. The vendor has released an emergency patch. Which of the following should be the information security managers PRIMARY concern?
Which of the following processes is MOST important for the success of a business continuity plan (BCP)?
Which of the following is the BEST tool to use for identifying and correlating intrusion attempt alerts?
An online trading company discovers that a network attack has penetrated the firewall. What should be the information security manager's FIRST response?
Which of the following will BEST facilitate timely and effective incident response?
Which of the following is the BEST course of action for an information security manager to align security and business goals?
An information security manager is MOST likely to obtain approval for a new security project when the business case provides evidence of:
Which of the following BEST facilitates effective strategic alignment of security initiatives?
Which of the following should include contact information for representatives of equipment and software vendors?
An incident response plan is being developed for servers hosting sensitive information. In the event of a breach, who should make the decision to shut down the system?
To effectively manage an organization's information security risk, it is MOST important to:
Which of the following is the BEST way to reduce the risk associated with a bring your own device (BYOD) program?
Which of the following would be MOST helpful to identify worst-case disruption scenarios?
The fundamental purpose of establishing security metrics is to:
Which of the following MUST be established to maintain an effective information security governance framework?
An organization's disaster recovery plan (DRP) is documented and kept at a disaster recovery site. Which of the following is the BEST way to ensure the plan can be carried out in an emergency?
Which of the following BEST helps to ensure the effective execution of an organization's disaster recovery plan (DRP)?
Which of the following metrics would BEST demonstrate the success of a newly implemented information security framework?
During the implementation of a new system, which of the following processes proactively minimizes the likelihood of disruption, unauthorized alterations, and errors?
Which of the following is the PRIMARY reason for executive management to be involved in establishing an enterprise's security management framework?
Which of the following is MOST important to ensure the alignment of an information security program with the organizational strategy?
Which of the following is the BEST indication of information security strategy alignment with the “&
Which of the following is the BEST reason to implement a comprehensive information security management system?
To ensure continuous alignment with the organizational strategy
To gain senior management support for the information security program
To support identification of key risk indicators (KRIs)
Which of the following is the BEST way to compete for funding for an information security program in an organization with limited resources?
Of the following, whose input is of GREATEST importance in the development of an information security strategy?
An information security manager has become aware that a third-party provider is not in compliance with the statement of work (SOW). Which of the following is the BEST course of action?
Which is following should be an information security manager's PRIMARY focus during the development of a critical system storing highly confidential data?
Which of the following is the PRIMARY reason to regularly update business continuity and disaster recovery documents?
An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to have access to critical business information. The security manager should focus PRIMARILY on defining:
Which of the following provides the MOST comprehensive understanding of an organization's information security posture?
Prior to implementing a bring your own device (BYOD) program, it is MOST important to:
The PRIMARY goal of the eradication phase in an incident response process is to:
In order to gain organization-wide support for an information security program, which of the following is MOST important to consider?
Which of the following BEST supports effective communication during information security incidents7
Which of the following would be the GREATEST threat posed by a distributed denial of service (DDoS) attack on a public-facing web server?
Which of the following should be the PRIMARY basis for a severity hierarchy for information security incident classification?
Following an information security risk assessment of a critical system, several significant issues have been identified. Which of the following is MOST important for the information security manager to confirm?
Before approving the implementation of a new security solution, senior management requires a business case. Which of the following would BEST support the justification for investment?
Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?
Which of the following BEST enables the capability of an organization to sustain the delivery of products and services within acceptable time frames and at predefined capacity during a disruption?
Which of the following is the BEST course of action if the business activity residual risk is lower than the acceptable risk level?
During a post-incident review, it was determined that a known vulnerability was exploited in order to gain access to a system. The vulnerability was patched as part of the remediation on the offending system. Which of the following should be done NEXT?
When performing a business impact analysis (BIA), who should calculate the recovery time and cost estimates?
When developing security processes for handling credit card data on the business unit's information system, the information security manager should FIRST:
Which of the following is the BEST evidence of alignment between corporate and information security governance?
Which of the following risk responses is an example of risk transfer?
Which of the following is the MOST effective way to identify changes in an information security environment?
Which of the following is the GREATEST concern resulting from the lack of severity criteria in incident classification?
Which of the following provides the MOST useful information for identifying security control gaps on an application server?
Which of the following is the BEST course of action when an online company discovers a network attack in progress?
To prepare for a third-party forensics investigation following an incident involving malware, the incident response team should:
When mitigation is the chosen risk treatment, which of the following roles is responsible for effective implementation of the chosen treatment?
Which of the following is the MOST appropriate risk response when the risk impact has been determined to be immaterial and the likelihood is very low?
Of the following, who is BEST suited to own the risk discovered in an application?
Which of the following is the MOST critical consideration when shifting IT operations to an Infrastructure as a Service (laaS) model hosted in a foreign country?
When updating the information security policy to accommodate a new regulation, the information security manager should FIRST:
Which of the following is the BEST way to ensure data is not co-mingled or exposed when using a cloud service provider?
Who has the PRIMARY authority to decide if additional risk treatments are required to mitigate an identified risk?
An organization is going through a digital transformation process, which places the IT organization in an unfamiliar risk landscape. The information security manager has been tasked with leading the IT risk management process. Which of the following should be given the HIGHEST priority?
Which of the following presents the GREATEST risk associated with the use of an automated security information and event management (SIEM) system?
Which of the following should be an information security manager's PRIMARY concern when an organization is expanding business to a new country?
Which of the following should be done FIRST once a cybersecurity attack has been confirmed?
Communicating which of the following would be MOST helpful to gain senior management support for risk treatment options?
What should be an information security manager’s FIRST course of action upon learning a business unit is bypassing an existing control in order to increase operational efficiency?
An information security manager notes that security incidents are not being appropriately escalated by the help desk after tickets are logged. Which of the following is the BEST automated control to resolve this issue?
An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?
Unintentional behavior by an employee caused a major data loss incident. Which of the following is the BEST way for the information security manager to prevent recurrence within the organization?
Which of the following would BEST enable a new information security manager to obtain senior management support for an information security governance program?
A multinational organization is required to follow governmental regulations with different security requirements at each of its operating locations. The chief information security officer (CISO) should be MOST concerned with:
Which type of policy BEST helps to ensure that all employees, contractors, and third-party users receive formal communication regarding an organization’s security program?
A common drawback of email software packages that provide native encryption of messages is that the encryption:
Which of the following is the BEST way to achieve compliance with new global regulations related to the protection of personal information?
Which of the following should be of GREATEST concern regarding an organization's security controls?
An email digital signature will:
Which of the following is the BEST reason for senior management to support a business case for developing a monitoring system for a critical application?
Which of the following is the BEST way to enhance training for incident response teams?
An organization has identified an increased threat of external brute force attacks in its environment. Which of the following is the MOST effective way to mitigate this risk to the organization's critical systems?
A business requires a legacy version of an application to operate but the application cannot be patched. To limit the risk exposure to the business, a firewall is implemented in front of the legacy application. Which risk treatment option has been applied?
Which of the following would be MOST useful to help senior management understand the status of information security compliance?
Which of the following is MOST important for the effective implementation of an information security governance program?
Which of the following is the MOST critical factor for information security program success?
A security review identifies that confidential information on the file server has been accessed by unauthorized users in the organization. Which of the following should the information security manager do FIRST?
An organization has implemented controls to mitigate risks resulting from identified vulnerabilities in an application. Which of the following is the BEST way to verify all weaknesses have been addressed?
Which of the following is the GREATEST value provided by a security information and event management (SIEM) system?
Which of the following roles is MOST appropriate to determine access rights for specific users of an application?
Which of the following should be done FIRST when a SIEM flags a potential event?