Question 56
The regular review of a firewall ruleset is considered a
Question 57
File Integrity Monitoring (FIM) is considered a
Question 58
A missing/ineffective security control is identified. Which of the following should be the NEXT step?
Question 59
What oversight should the information security team have in the change management process for application security?
Question 60
Which business stakeholder is accountable for the integrity of a new information system?