CISM Exam Question 11

What does a network vulnerability assessment intend to identify?
  • CISM Exam Question 12

    Which of the following steps in conducting a risk assessment should be performed FIRST?
  • CISM Exam Question 13

    An access rights review revealed that some former employees' access is still active. Once the access is revoked, which of the following is the BEST course of action to help prevent recurrence?
  • CISM Exam Question 14

    A risk assessment has been conducted following a data owner's decision to outsource an application to a cloud provider Which of the following should be the information security manager's NEXT course of action?
  • CISM Exam Question 15

    The MOST useful way to describe the objectives in the information security strategy is through: