CISM Exam Question 536
During which phase of development is it MOST appropriate to begin assessing the risk of a new application system?
CISM Exam Question 537
An information security manager reviewed the access control lists and observed that privileged access was granted to an entire department. Which of the following should the information security manager do FIRST?
CISM Exam Question 538
Several identified risks have been mitigated to an acceptable level with appropriate controls. Which of the following activities would BEST help to maintain acceptable risk levels?
CISM Exam Question 539
When developing an information security governance framework, which of the following would be the MAIN impact when lacking senior management involvement?
CISM Exam Question 540
Which of the following should be the PRIMARY consideration when developing an incident response plan?