CISM Exam Question 266

An information security manager is asked to provide evidence that the organization is fulfilling its legal obligation to protect personally identifiable information (PII).
Which of the following would be
  • CISM Exam Question 267

    The security responsibility of data custodians in an organization will include:
  • CISM Exam Question 268

    An organization has an approved bring your own device (BYOD) program. Which of the following is the MOST effective method to enforce application control on personal devices?
  • CISM Exam Question 269

    When designing security controls, it is MOST important to:
  • CISM Exam Question 270

    An organization has adopted a practice of regular staff rotation to minimize the risk of fraud and encourage cross training. Which type of authorization policy would BEST address this practice?