CISM Exam Question 396

A user reports a stolen personal mobile device that stores sensitive corporate data. Which of the following will BEST minimize the risk of data exposure?
  • CISM Exam Question 397

    The systems administrator did not immediately notify the security officer about a malicious attack. An information security manager could prevent this situation by:
  • CISM Exam Question 398

    The implementation of continuous monitoring controls is the BEST option where:
  • CISM Exam Question 399

    An organization is in the process of adopting a hybrid data infrastructure, transferring all non-core applications to cloud service providers and maintaining all core business functions in-house. The information security manager has determined a defense in depth strategy should be used. Which of the following BEST describes this strategy?
  • CISM Exam Question 400

    A risk management program should reduce risk to: