CISM Exam Question 351
Which of the following is the MOST important factor to consider when establishing a severity hierarchy for information security incidents?
CISM Exam Question 352
The service level agreement (SLA) for an outsourced IT function does not reflect an adequate level of protection. In this situation an information security manager should:
CISM Exam Question 353
An organization has an approved bring your own device (BYOD) program. Which of the following is the MOST effective method to enforce application control on personal devices?
CISM Exam Question 354
Who would be in the BEST position to determine the recovery point objective (RPO) for business applications?
CISM Exam Question 355
For a business operating in a competitive and evolving online market, it is MOST important for a security policy to focus on: