CISM Exam Question 31

Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?
  • CISM Exam Question 32

    An unauthorized user gained access to a merchant's database server and customer credit card information.
    Which of the following would be the FIRST step to preserve and protect unauthorized intrusion activities?
  • CISM Exam Question 33

    Which of the following would BEST address the risk of data leakage?
  • CISM Exam Question 34

    Which of the following is the MOST important component of information security governance?
  • CISM Exam Question 35

    When an organization hires a new information security manager, which of the following goals should this individual pursue FIRST?