CISM Exam Question 396
A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?
CISM Exam Question 397
The systems administrator did not immediately notify the security officer about a malicious attack. An information security manager could prevent this situation by:
CISM Exam Question 398
The implementation of continuous monitoring controls is the BEST option where:
CISM Exam Question 399
An organization is in the process of adopting a hybrid data infrastructure, transferring all non-core applications to cloud service providers and maintaining all core business functions in-house. The information security manager has determined a defense in depth strategy should be used. Which of the following BEST describes this strategy?
CISM Exam Question 400
A risk management program should reduce risk to: