CISM Exam Question 236
An unauthorized user gained access to a merchant's database server and customer credit card information. Which of the following would be the FIRST step to preserve and protect unauthorized intrusion activities?
CISM Exam Question 237
Which of the following parties should be responsible for determining access levels to an application that processes client information?
CISM Exam Question 238
The MOST important element in achieving executive commitment to an information security governance program is:
CISM Exam Question 239
Which of the following is the BEST way to determine if an information security program aligns with corporate governance?
CISM Exam Question 240
When identifying legal and regulatory issues affecting information security, which of the following would represent the BEST approach to developing information security policies?