CISM Exam Question 176

An organization finds unauthorized software has been installed on a number of workstations. The software was found to contain a Trojan, which had been uploading data to an unknown external party. Which of the following would have BEST prevented the installation of the unauthorized software?
  • CISM Exam Question 177

    When reporting to senior management on an information security vulnerability that could lead to a potential breach, what information is MOST likely to facilitate the decision-making process?
  • CISM Exam Question 178

    The effectiveness of security awareness programs in fostering positive security cultures is MOST dependent upon employee:
  • CISM Exam Question 179

    Which of the following should be of GREATEST concern to an information security manager when establishing a set of key risk indicators (KRIs)?
  • CISM Exam Question 180

    The MAIN reason for internal certification of web-based business applications is to ensure: