CISM Exam Question 456
What should be the PRIMARY objective of conducting interviews with business unit managers when developing an information security strategy?
CISM Exam Question 457
During the security review of a legacy business application, it was discovered that sensitive client data is not encrypted in storage, which does not comply with the organization's information security policy. Which of the following would be the information security manager's BEST course of action?
CISM Exam Question 458
An information security manager has been alerted to a possible incident involving a breach at one of the organization's vendors. Which of the following should be done FIRST?
CISM Exam Question 459
Relying on which of the following methods when detecting new threats using IDS should be of MOST concern?
CISM Exam Question 460
Which of the following contributes MOST to the effective implementation of an information security strategy?