CISM Exam Question 56
Which of the following would BEST mitigate identified vulnerabilities in a timely manner?
CISM Exam Question 57
The MOST important outcome of information security governance is:
CISM Exam Question 58
What is the BEST way to ensure that an intruder who successfully penetrates a network will be detected before significant damage is inflicted?
CISM Exam Question 59
An internal control audit has revealed a control deficiency related to a legacy system where the compensating controls no longer appear to be effective. Which of the following would BEST help the information security manager determine the security requirements to resolve the control deficiency?
CISM Exam Question 60
Which of the following approaches would MOST likely ensure that risk management is integrated into the business life cycle processes?