CISM Exam Question 266
An information security manager is asked to provide evidence that the organization is fulfilling its legal obligation to protect personally identifiable information (PII).
Which of the following would be
Which of the following would be
CISM Exam Question 267
The security responsibility of data custodians in an organization will include:
CISM Exam Question 268
An organization has an approved bring your own device (BYOD) program. Which of the following is the MOST effective method to enforce application control on personal devices?
CISM Exam Question 269
When designing security controls, it is MOST important to:
CISM Exam Question 270
An organization has adopted a practice of regular staff rotation to minimize the risk of fraud and encourage cross training. Which type of authorization policy would BEST address this practice?