CISM Exam Question 596
Which of the following would be MOST relevant to include in a cost-benefit analysis of a two-factor authentication system?
CISM Exam Question 597
The MOST effective use of a risk register is to:
CISM Exam Question 598
An information security manager discovers that the organization's new information security policy is not being followed across all departments. Which of the following should be of GREATEST concern to the information security manager?
CISM Exam Question 599
Which of the following is the BEST way to improve the timely reporting of information security incidents?
CISM Exam Question 600
The PRIMARY purpose of vulnerability assessments is to: