According to scenario 7, a demilitarized zone (DMZ) is deployed within InfoSec’s network. What type of control has InfoSec implemented in this case?
Based on scenario 7, InfoSec contracted Anna as an external consultant. Based on her tasks, is this action compliant with ISO/IEC 27001?
Based on scenario 7, what should Anna be aware of when gathering data?
Why did InfoSec establish an IRT? Refer to scenario 7.
Kyte, a company that has an online shopping website, has added a Q&A section to its website; however, its Customer Service Department almost never provides answers to users’ questions. Which principle of an effective communication strategy has Kyte not followed?
What should an organization allocate to ensure the maintenance and improvement of the information security management system?