`
An Information Security Specialist protects an organization's computer networks, systems, and sensitive data from cyber threats by implementing security controls, conducting risk assessments, and responding to security breaches.
Q2203: What is the first step in risk management?
Q2204: Which document outlines acceptable use of organizational systems?
Q2205: What is the main goal of incident response?