CISM Exam Question 26
When preventative controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager to perform?
CISM Exam Question 27
Which of the following is an information security manager's FIRST priority after a high-profile system has been compromised?
CISM Exam Question 28
An employee has just reported the loss of a personal mobile device containing corporate information. Which of the following should the information security manager do FIRST?
CISM Exam Question 29
The MOST effective way to ensure that outsourced service providers comply with the organization's information security policy would be:
CISM Exam Question 30
During a post-incident review, the sequence and correlation of actions must be analyzed PRIMARILY based on: