When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always betaken into consideration?
Correct Answer:
A
How does the use of a "single sign-on" access control policy improve the security for an organisation implementing the policy?
Correct Answer:
B
In business continuity (BC) terms, what is the name of the individual responsible for recording all pertinent information associated with a BCexercise or real plan invocation?
Correct Answer:
A
Which term describes the acknowledgement and acceptance of ownership of actions, decisions, policies and deliverables?
Correct Answer:
A
https://hr.nd.edu/assets/17442/behavior_model_4_ratings_3_.pdf
What types of web application vulnerabilities continue to be the MOST prolific according to the OWASP Top 10?
Correct Answer:
C