An application vulnerability assessment has identified a security flaw in an application. This is a flaw that was previously identified and remediated on a prior release of the application. Which of the following is MOST likely the reason for this recurring issue?
A CISO implements smart cards for credential management, and as a result has reduced costs associated with help desk operations supporting password resets. This demonstrates which of the following principles?
A recommended method to document the respective roles of groups and individuals for a given process is to:
When should IT security project management be outsourced?
A system was hardened at the Operating System level and placed into the production environment. Months later an audit was performed and it identified insecure configuration different from the original hardened state. Which of the following security issues is the MOST likely reason leading to the audit findings?
Which of the following will be MOST helpful for getting an Information Security project that is behind schedule back on schedule?
Which of the following is critical in creating a security program aligned with an organization’s goals?
Which of the following is a major benefit of applying risk levels?
When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?
Which of the following functions implements and oversees the use of controls to reduce risk when creating an information security program?