What Is the PRIMARY reason for organisations obtaining outsourced managed security services?
When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?
Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?
Which three of the following characteristics form the AAA Triad in Information Security?
1. Authentication
2. Availability
3. Accounting
4. Asymmetry
5. Authorisation
How does the use of a "single sign-on" access control policy improve the security for an organisation implementing the policy?
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
What term is used to describe the testing of a continuity plan through a written scenario being used as the basis for discussion and simul-ation?