CISM Exam Question 461

An account with full administrative privileges over a production file is found to be accessible by a member of the software development team. This account was set up to allow the developer to download nonsensitive production data for software testing purposes. The information security manager should recommend which of the following?
  • CISM Exam Question 462

    An organization experienced a breach which was successfully contained and remediated. Based on industry regulations, the breach needs to be communicated externally. What should the information security manager do NEXT?
  • CISM Exam Question 463

    Which of the following is MOST important for an information security manager to communicate to senior management regarding the security program?
  • CISM Exam Question 464

    Which of the following is a potential indicator of inappropriate Internet use by staff?
  • CISM Exam Question 465

    The MOST important reason that statistical anomaly-based intrusion detection systems (slat IDSs) are less commonly used than signature-based IDSs, is that stat IDSs: