Question 111
Which of the following email security tools can be used by an incident handler to prevent the organization against evolving email threats?
Question 112
The left over risk after implementing a control is called:
Question 113
Policies are designed to protect the organizational resources on the network by establishing the set rules and procedures. Which of the following policies authorizes a group of users to perform a set of actions on a set of resources?
Question 114
A Malicious code attack using emails is considered as:
Question 115
An organization faced an information security incident where a disgruntled employee passed sensitive access
control information to a competitor. The organization's incident response manager, upon investigation, found
that the incident must be handled within a few hours on the same day to maintain business continuity and
market competitiveness. How would you categorize such information security incident?