CISM Exam Question 176
Which of the following should an information security manager do FIRST after discovering that a business unit has implemented a newly purchased application and bypassed the change management process?
CISM Exam Question 177
When developing an information security program, what is the MOST useful source of information for determining available resources?
CISM Exam Question 178
A daily monitoring report reveals that an IT employee made a change to a firewall rule outside of the change control process. The information security manager's FIRST step in addressing the issue should be to:
CISM Exam Question 179
Reviewing security objectives and ensuring the integration of security across business units is PRIMARILY the focus of the:
CISM Exam Question 180
Which of the following is the FIRST step when defining and prioritizing security controls to be implemented under an information security program?