CISM Exam Question 91
Following a significant change to the underlying code of an application, it is MOST important for the information security manager to:
CISM Exam Question 92
Who is MOST important to include when establishing the response process for a significant security breach that would impact the IT infrastructure and cause customer data toss?
CISM Exam Question 93
An information security manager has discovered a potential security breach in a server that supports a critical business process. Which of the following should be the information security manager's FIRST course of action?
CISM Exam Question 94
Which of the following is the BEST way to evaluate the impact of threat events on an organization's IT operations?
CISM Exam Question 95
Which of the following should be of MOST concern to an information security manager reviewing an organization's data classification program?