List of questions
Related questions
Question 469 - CISM discussion
Which of the following should an information security manager do FIRST after identifying suspicious activity on a PC that is not in the organization's IT asset inventory?
A.
Isolate the PC from the network
B.
Perform a vulnerability scan
C.
Determine why the PC is not included in the inventory
D.
Reinforce information security training
Your answer:
0 comments
Sorted by
Leave a comment first