CISM Exam Question 671

Risk assessment should be built into which of the following systems development phases to ensure that risks are addressed in a development project?
  • CISM Exam Question 672

    A risk assessment report shows that phishing attacks are an emerging threat for an organization that supports online financial services. Which of the following is the information security manager's BEST course of action?
  • CISM Exam Question 673

    Which of the following would BEST address the risk of data leakage?
  • CISM Exam Question 674

    An organization has outsourced many application development activities to a third party that uses contract programmers extensively. Which of the following would provide the BEST assurance that the third party's contract programmers comply with the organization's security policies?
  • CISM Exam Question 675

    Which of the following should be performed FIRST in the aftermath of a denial-of-service attack?