CISM Exam Question 581
An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. The vulnerability identified is:
CISM Exam Question 582
When evaluating vendors for sensitive data processing, which of the following should be the FIRST step to ensure the correct level of information security is provided?
CISM Exam Question 583
Which of the following should be included in an annual information security budget that is submitted for management approval?
CISM Exam Question 584
During a review to approve a penetration test plan, which of the following should be an information security manager's PRIMARY concern?
CISM Exam Question 585
Which of the following is MOST effective in preventing security weaknesses in operating systems?