CISM Exam Question 171
Relying on which of the following methods when detecting new threats using IDS should be of MOST concern?
CISM Exam Question 172
Which of the following is the MOST appropriate frequency for updating antivirus signature files for antivirus software on production servers?
CISM Exam Question 173
Which of the following is the MOST effective way to mitigate the risk of data loss in the event of a stolen laptop?
CISM Exam Question 174
Which of the following is the MOST effective method for assessing the effectiveness of a security awareness program?
CISM Exam Question 175
To help ensure that contract personnel do not obtain unauthorized access to sensitive information, an information security manager should PRIMARILY: