CISM Exam Question 271
An organization determines that an end-user has clicked on a malicious link. Which of the following would MOST effectively prevent similar situations from recurring?
CISM Exam Question 272
Which of the following is MOST likely to reduce the effectiveness of a signature-based intrusion detection system (IDS)?
CISM Exam Question 273
In a well-controlled environment, which of the following activities is MOST likely to lead to the introduction of weaknesses in security software?
CISM Exam Question 274
Which of the following practices is BEST to remove system access for contractors and other temporary users when it is no longer required?
CISM Exam Question 275
Which of the following is the BEST method for ensuring that security procedures and guidelines are known and understood?