Your company s computers have been taken over by an attacker and used to attack other organization s information systems. Your problem is which of the following?
A. poor security policies and procedures
B. lack of due diligence
C. downstream liability
D. poor service-level agreements
E. users have a lack of information security awareness
No comments:
Post a Comment
Note: only a member of this blog may post a comment.