CISM Exam Question 76

A PRIMARY purpose of creating security policies is to:
  • CISM Exam Question 77

    An information security manager learns that IT personnel are not adhering to the information security policy because it creates process inefficiencies. What should the information security manager do FIRST?
  • CISM Exam Question 78

    A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?
  • CISM Exam Question 79

    Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?
  • CISM Exam Question 80

    Which of the following is MOST important to include in monthly information security reports to the board?