CISM Exam Question 116

An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
  • CISM Exam Question 117

    A recovery point objective (RPO) is required in which of the following?
  • CISM Exam Question 118

    The fundamental purpose of establishing security metrics is to:
  • CISM Exam Question 119

    Which of the following is the PRIMARY reason for granting a security exception?
  • CISM Exam Question 120

    Which of the following should be the PRIMARY basis for a severity hierarchy for information security incident classification?