Question 6
Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and uses the special card in order to access the restricted area of the target company. Just as the employee opens the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so that he can enter. What is the best way to undermine the social engineering activity of tailgating?
Question 7
Which of the following provides an independent assessment of a vendor's internal security controls and overall posture?
Question 8
Which of the following set of processes is considered to be one of the cornerstone cycles of the International Organization for Standardization (ISO) 27001 standard?
Question 9
Which of the following is the MOST logical method of deploying security controls within an organization?
Question 10
The primary purpose of a risk register is to: