CISM Exam Question 1
An organization finds unauthorized software has been installed on a number of workstations. The software was found to contain a Trojan which had been uploading data to an unknown external party. Which of the following would have BEST prevented the installation of the unauthorized software?
CISM Exam Question 2
When a user employs a client-side digital certificate to authenticate to a web server through Secure Socket Layer (SSI.), confidentiality is MOST vulnerable to which of the following?
CISM Exam Question 3
A business case for investment in an information security management infrastructure MUST include:
CISM Exam Question 4
Which of the following is the PRIMARY reason for implementing a risk management program?
CISM Exam Question 5
Good information security standards should: