CISM Exam Question 81
Minimum standards for securing the technical infrastructure should be defined in a security:
CISM Exam Question 82
An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. What is the information security manager's BEST course of action?
CISM Exam Question 83
The PRIMARY objective of performing a post-incident review is to:
CISM Exam Question 84
Phishing is BEST mitigated by which of the following?
CISM Exam Question 85
Which of the following has the highest priority when defining an emergency response plan?