An information security manager believes that information has been classified inappropriately, = the risk of a breach. Which of the following is the information security manager's BEST action?
Instructing system owners to reclassify seems risky; they might not have the full context. I feel like I’ve seen this scenario in practice exams before.
Hmm, I'm a bit confused on how to properly configure the mirroring and cache. Should the disks be mirrored and the flash devices used as cache, or is there a different way to set that up?
Tesha
5 months agoRemedios
5 months agoLura
6 months agoFrancis
6 months agoCarin
6 months agoMarion
6 months agoAlease
6 months agoMargot
6 months agoMy
6 months agoTheresia
6 months agoRonald
6 months ago