CISM Exam Question 176
An organization finds unauthorized software has been installed on a number of workstations. The software was found to contain a Trojan, which had been uploading data to an unknown external party. Which of the following would have BEST prevented the installation of the unauthorized software?
CISM Exam Question 177
When reporting to senior management on an information security vulnerability that could lead to a potential breach, what information is MOST likely to facilitate the decision-making process?
CISM Exam Question 178
The effectiveness of security awareness programs in fostering positive security cultures is MOST dependent upon employee:
CISM Exam Question 179
Which of the following should be of GREATEST concern to an information security manager when establishing a set of key risk indicators (KRIs)?
CISM Exam Question 180
The MAIN reason for internal certification of web-based business applications is to ensure: