List of questions
Related questions
Question 141 - CISM discussion
A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?
A.
Instruct the vendor to conduct penetration testing.
B.
Suspend the connection to the application in the firewall
C.
Report the situation to the business owner of the application.
D.
Initiate the organization's incident response process.
Your answer:
0 comments
Sorted by
Leave a comment first