Who is MOST important to include when establishing the response process for a significant security breach that would impact the IT infrastructure and cause customer data loss?

Posted by: Pdfprep Category: CISM Tags: , ,

Who is MOST important to include when establishing the response process for a significant security breach that would impact the IT infrastructure and cause customer data loss?
A . An independent auditor for identification of control deficiencies
B . A damage assessment expert for calculating losses
C . A forensics expert for evidence management
D . A penetration tester to validate the attack

Answer: C

Leave a Reply

Your email address will not be published.