An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?
Instructing system owners to reclassify seems risky; they might not have the full context. I feel like I’ve seen this scenario in practice exams before.
Hmm, I'm a bit confused on how to properly configure the mirroring and cache. Should the disks be mirrored and the flash devices used as cache, or is there a different way to set that up?
Tesha
4 months agoRemedios
4 months agoLura
4 months agoFrancis
4 months agoCarin
4 months agoMarion
5 months agoAlease
5 months agoMargot
5 months agoMy
5 months agoTheresia
5 months agoRonald
5 months ago