Thursday 31 May 2012

Your company s computers have been taken over by an attacker and


Your company s computers have been taken over by an attacker and used to attack other organization s information systems. Your problem is which of the following? 
A. poor security policies and procedures 
B. lack of due diligence 
C. downstream liability 
D. poor service-level agreements 
E. users have a lack of information security awareness 
 

No comments:

Post a Comment

Note: only a member of this blog may post a comment.